Bug#877903: CVE-2017-15037

2017-10-06 Thread Moritz Muehlenhoff
Source: kfreebsd-10 Severity: important Tags: security Please see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15037 Cheers, Moritz

Bug#818233: Fails to build from source on kfreebsd-amd64

2016-03-14 Thread Moritz Muehlenhoff
Package: libgdk-pixbuf2.0-0 Version: 2.32.3-1.2 Severity: important gdk-pixbuf on kfreebsd-amd64 is still at version 2.31.5-1 since all later version fail to build. Can someone from the kfreebsd porters look into this? It works on kfreebsd-i386. Cheers, Moritz

Re: Bug#801069: RM: workrave [kfreebsd-amd64 kfreebsd-i386] -- RoQA; outdated binaries blocking gstreamer 0.10 removal

2015-10-06 Thread Moritz Muehlenhoff
On Tue, Oct 06, 2015 at 05:15:57PM +0100, Steven Chamberlain wrote: > Hi! > > Moritz Muehlenhoff wrote: > > please remove workrave on kfreebsd-*. The kfreebsd builds are blocked > > by glib #712848, which is unfixed for over two years :-/ > > That bug looks like a

Re: possibility of jessie-kfreebsd suite

2015-01-03 Thread Moritz Muehlenhoff
On Sat, Jan 03, 2015 at 05:36:38PM +0100, Ansgar Burchardt wrote: > Hi, > > > Moritz Mühlenhoff writes: > >> Sorry for the late reply. I'm afraid noone in the security team is > >> sufficiently familiar with the wanna-build setup, but I if implementable > >> by w-b I think it would be good to hav

Re: RFC: disable SCTP in Debian's kFreeBSD?

2014-08-24 Thread Moritz Muehlenhoff
On Mon, Aug 25, 2014 at 01:27:43AM +0100, Steven Chamberlain wrote: > On 06/08/14 22:18, Moritz Mühlenhoff wrote: > > On Wed, Jul 09, 2014 at 01:26:22AM +0100, Steven Chamberlain wrote: > >> So I'm obviously asking here - could we just drop SCTP from the default > >> kernel config? In jessie/sid?

Bug#691793: FTBFS on kfreebsd-*

2012-10-29 Thread Moritz Muehlenhoff
Package: ruby1.8 Version: 1.8.7.358-5 Severity: serious Hi, ruby1.8 FTBFSes on kfreebsd-*, see https://buildd.debian.org/status/package.php?p=ruby1.8 Cheers, Moritz -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd

Bug#690986: CVE-2012-5363 CVE-2012-5365

2012-10-19 Thread Moritz Muehlenhoff
Package: kfreebsd-8 Severity: important Tags: security Two security issues were found in the kfreebsd network stack: http://www.openwall.com/lists/oss-security/2012/10/10/8 Issue #1 was assigned CVE-2012-5363 Issue #1 was assigned CVE-2012-5365 Cheers, Moritz -- To UNSUBSCRIBE, email

Bug#686962: CVE-2012-3549: kfreebsd SCTP DoS

2012-09-25 Thread Moritz Muehlenhoff
On Fri, Sep 07, 2012 at 12:17:45PM -0500, Raphael Geissert wrote: > Package: kfreebsd-8 > Severity: grave > Tags: security > Control: clone -1 -2 -3 > Control: reassign -2 src:kfreebsd-9 > Control: reassign -3 src:kfreebsd-10 > > Hi, > > CVE-2012-3549 has been assigned to be a remote DoS (via a N

Bug#684072: CVE-2011-2393: ICMPv6 Router Announcement flooding DoS

2012-09-07 Thread Moritz Muehlenhoff
On Fri, Aug 31, 2012 at 09:06:35PM +0200, Petr Salinger wrote: > forwarded 684072 http://www.freebsd.org/cgi/query-pr.cgi?pr=158726 > -- > > The description of the problem is: > > When flooding the local network with random router advertisements, > hosts and routers update the network informati

Bug#684072: CVE-2011-2393

2012-08-06 Thread Moritz Muehlenhoff
Package: kfreebsd-9 Severity: important Tags: security Please see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2393 I'm not sure if there's an upstream fix in the mean time? Cheers, Moritz -- To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org with a subject of "u

Bug#613312: kfreebsd: denial-of-service

2011-02-15 Thread Moritz Muehlenhoff
On Mon, Feb 14, 2011 at 08:15:43AM +0100, Petr Salinger wrote: > forcemerge 613312 611476 > -- >> a denial-of-service has been posted for freebsd [0]. i don't have time >> to verify whether any of the claims actually affect debian. please >> check the kfreebsd package. >> >> [0] http://www.exploit

Re: Bug#600655: Detection of ALSA support in configure test

2010-12-19 Thread Moritz Muehlenhoff
On Sun, Dec 19, 2010 at 07:50:58PM +0100, Julien Cristau wrote: > On Sun, Dec 19, 2010 at 18:44:25 +0100, Robert Millan wrote: > > > A quick glance at the source suggests that ALSA is > > only used for midi sound playback, and that > > timidity/oss is a viable alternative. If that's the case > >

Detection of ALSA support in configure test

2010-12-19 Thread Moritz Muehlenhoff
Dear kfreebsd developers, I'm looking into a build failure of the scummvm package. (#600655) It uses the following configure snippet to detect the availability of ALSA: - # # Check for ALSA # echocheck "ALSA >= 0.9" if test "$_alsa" = auto ; then _alsa=no

Bug#584930: Two security issues fixed in FreeBSD

2010-06-07 Thread Moritz Muehlenhoff
Package: kfreebsd-8 Severity: grave Tags: security Hi, the following CVE IDs have been published for FreeBSD, please check whether they need to be fixed for kfreebsd and whether kfreebsd-6 and kfreebsd-7 from Lenny are affected: CVE-2010-2022: http://security.FreeBSD.org/advisories/FreeBSD-SA-10:

Bug#559107: weaknesses in BSD PRNG algorithms

2009-12-03 Thread Moritz Muehlenhoff
severity 559107 normal thanks On Thu, Dec 03, 2009 at 02:01:06PM +0100, Petr Salinger wrote: > severity 559107 important > -- > > >But the status of CVE-2008-114[678] is still open. Do they affect the > >KFreeBSD port? What's the position of the FreeBSD kernel developers on > >these issues? > >

Bug#559107: closed by Petr Salinger (Re: Bug#559107: Local root exploit in rtld)

2009-12-02 Thread Moritz Muehlenhoff
reopen 559107 retitle 559107 weaknesses in BSD PRNG algorithms thanks > >http://seclists.org/fulldisclosure/2009/Nov/371 > > > >Colin Percival posted a preliminary patch, a full advisory is announced > >for tomorrow. > > > >I suppose this affects Debian/KFreeBSD? > > No, the rtld (/lib/ld*.so) c

Bug#559107: Local root exploit in rtld

2009-12-01 Thread Moritz Muehlenhoff
Package: kfreebsd-7 Severity: grave Tags: security http://seclists.org/fulldisclosure/2009/Nov/371 Colin Percival posted a preliminary patch, a full advisory is announced for tomorrow. I suppose this affects Debian/KFreeBSD? One a side note, what's the status of CVE-2009-114[678] ? #483152 was

Bug#549871: Devfs / VFS NULL pointer race condition

2009-10-05 Thread Moritz Muehlenhoff
Package: kfreebsd-7 Severity: grave Tags: security I suppose this affects Debian/KFreeBSD? http://security.FreeBSD.org/advisories/FreeBSD-SA-09:14.devfs.asc If you fix the packages in Lenny (not yet covered by security support) in a point update, you might also want to address http://security.fre

Re: Note about missing security support for kfreebsd-5

2006-10-10 Thread Moritz Muehlenhoff
Aurelien Jarno wrote: > > I noticed that kfreebsd-5 is in testing now. There won't be security > > support for the FreeBSD kernel until Debian-KFreeBSD is a fully > > functional, official port. Yet users may run into this error if > > it's included in the stable release. Please either > > a) have i

Note about missing security support for kfreebsd-5

2006-10-09 Thread Moritz Muehlenhoff
Hi, I noticed that kfreebsd-5 is in testing now. There won't be security support for the FreeBSD kernel until Debian-KFreeBSD is a fully functional, official port. Yet users may run into this error if it's included in the stable release. Please either a) have it removed from testing or b) place a p