Source: kfreebsd-10
Severity: important
Tags: security
Please see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15037
Cheers,
Moritz
Package: libgdk-pixbuf2.0-0
Version: 2.32.3-1.2
Severity: important
gdk-pixbuf on kfreebsd-amd64 is still at version 2.31.5-1 since all
later version fail to build. Can someone from the kfreebsd porters
look into this? It works on kfreebsd-i386.
Cheers,
Moritz
On Tue, Oct 06, 2015 at 05:15:57PM +0100, Steven Chamberlain wrote:
> Hi!
>
> Moritz Muehlenhoff wrote:
> > please remove workrave on kfreebsd-*. The kfreebsd builds are blocked
> > by glib #712848, which is unfixed for over two years :-/
>
> That bug looks like a
On Sat, Jan 03, 2015 at 05:36:38PM +0100, Ansgar Burchardt wrote:
> Hi,
>
> > Moritz Mühlenhoff writes:
> >> Sorry for the late reply. I'm afraid noone in the security team is
> >> sufficiently familiar with the wanna-build setup, but I if implementable
> >> by w-b I think it would be good to hav
On Mon, Aug 25, 2014 at 01:27:43AM +0100, Steven Chamberlain wrote:
> On 06/08/14 22:18, Moritz Mühlenhoff wrote:
> > On Wed, Jul 09, 2014 at 01:26:22AM +0100, Steven Chamberlain wrote:
> >> So I'm obviously asking here - could we just drop SCTP from the default
> >> kernel config? In jessie/sid?
Package: ruby1.8
Version: 1.8.7.358-5
Severity: serious
Hi,
ruby1.8 FTBFSes on kfreebsd-*, see
https://buildd.debian.org/status/package.php?p=ruby1.8
Cheers,
Moritz
-- System Information:
Debian Release: wheezy/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd
Package: kfreebsd-8
Severity: important
Tags: security
Two security issues were found in the kfreebsd network stack:
http://www.openwall.com/lists/oss-security/2012/10/10/8
Issue #1 was assigned CVE-2012-5363
Issue #1 was assigned CVE-2012-5365
Cheers,
Moritz
--
To UNSUBSCRIBE, email
On Fri, Sep 07, 2012 at 12:17:45PM -0500, Raphael Geissert wrote:
> Package: kfreebsd-8
> Severity: grave
> Tags: security
> Control: clone -1 -2 -3
> Control: reassign -2 src:kfreebsd-9
> Control: reassign -3 src:kfreebsd-10
>
> Hi,
>
> CVE-2012-3549 has been assigned to be a remote DoS (via a N
On Fri, Aug 31, 2012 at 09:06:35PM +0200, Petr Salinger wrote:
> forwarded 684072 http://www.freebsd.org/cgi/query-pr.cgi?pr=158726
> --
>
> The description of the problem is:
>
> When flooding the local network with random router advertisements,
> hosts and routers update the network informati
Package: kfreebsd-9
Severity: important
Tags: security
Please see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2393
I'm not sure if there's an upstream fix in the mean time?
Cheers,
Moritz
--
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "u
On Mon, Feb 14, 2011 at 08:15:43AM +0100, Petr Salinger wrote:
> forcemerge 613312 611476
> --
>> a denial-of-service has been posted for freebsd [0]. i don't have time
>> to verify whether any of the claims actually affect debian. please
>> check the kfreebsd package.
>>
>> [0] http://www.exploit
On Sun, Dec 19, 2010 at 07:50:58PM +0100, Julien Cristau wrote:
> On Sun, Dec 19, 2010 at 18:44:25 +0100, Robert Millan wrote:
>
> > A quick glance at the source suggests that ALSA is
> > only used for midi sound playback, and that
> > timidity/oss is a viable alternative. If that's the case
> >
Dear kfreebsd developers,
I'm looking into a build failure of the scummvm package. (#600655)
It uses the following configure snippet to detect the availability
of ALSA:
-
#
# Check for ALSA
#
echocheck "ALSA >= 0.9"
if test "$_alsa" = auto ; then
_alsa=no
Package: kfreebsd-8
Severity: grave
Tags: security
Hi,
the following CVE IDs have been published for FreeBSD, please
check whether they need to be fixed for kfreebsd and whether
kfreebsd-6 and kfreebsd-7 from Lenny are affected:
CVE-2010-2022:
http://security.FreeBSD.org/advisories/FreeBSD-SA-10:
severity 559107 normal
thanks
On Thu, Dec 03, 2009 at 02:01:06PM +0100, Petr Salinger wrote:
> severity 559107 important
> --
>
> >But the status of CVE-2008-114[678] is still open. Do they affect the
> >KFreeBSD port? What's the position of the FreeBSD kernel developers on
> >these issues?
>
>
reopen 559107
retitle 559107 weaknesses in BSD PRNG algorithms
thanks
> >http://seclists.org/fulldisclosure/2009/Nov/371
> >
> >Colin Percival posted a preliminary patch, a full advisory is announced
> >for tomorrow.
> >
> >I suppose this affects Debian/KFreeBSD?
>
> No, the rtld (/lib/ld*.so) c
Package: kfreebsd-7
Severity: grave
Tags: security
http://seclists.org/fulldisclosure/2009/Nov/371
Colin Percival posted a preliminary patch, a full advisory is announced
for tomorrow.
I suppose this affects Debian/KFreeBSD?
One a side note, what's the status of CVE-2009-114[678] ? #483152 was
Package: kfreebsd-7
Severity: grave
Tags: security
I suppose this affects Debian/KFreeBSD?
http://security.FreeBSD.org/advisories/FreeBSD-SA-09:14.devfs.asc
If you fix the packages in Lenny (not yet covered by security support)
in a point update, you might also want to address
http://security.fre
Aurelien Jarno wrote:
> > I noticed that kfreebsd-5 is in testing now. There won't be security
> > support for the FreeBSD kernel until Debian-KFreeBSD is a fully
> > functional, official port. Yet users may run into this error if
> > it's included in the stable release. Please either
> > a) have i
Hi,
I noticed that kfreebsd-5 is in testing now. There won't be security
support for the FreeBSD kernel until Debian-KFreeBSD is a fully
functional, official port. Yet users may run into this error if
it's included in the stable release. Please either
a) have it removed from testing or
b) place a p
20 matches
Mail list logo