On Fri, Nov 07, 2014 at 01:07:34AM +, Steven Chamberlain wrote:
Dear Security Team,
Please could we upload to wheezy-security with the attached debdiff to
fix issues in kfreebsd-9 (kernel).
This disables support for SCTP as previously discussed:
Hi!
Steven Chamberlain ste...@pyro.eu.org writes:
I don't see any downside to it being in sid: I think the changes are
careful enough to not get in the way of a future unblock, so isn't
likely to force some future fix to go through t-p-u instead.
How is the release doing? Which channels do
Moritz Mühlenhoff j...@inutil.org writes:
On Fri, Nov 07, 2014 at 01:07:34AM +, Steven Chamberlain wrote:
Dear Security Team,
Please could we upload to wheezy-security with the attached debdiff to
fix issues in kfreebsd-9 (kernel).
This disables support for SCTP as previously
Hi!
Christoph Egger wrote:
How is the release doing? Which channels do you actually use to get the
RC and Release revisions before I can find them anywhere on the net?
Oh, I have this hourly cron script email me when a new release is tagged
in upstream SVN:
| REVISION=10.1
| BRANCH=$(wget
Christoph Egger wrote:
Moritz Mühlenhoff j...@inutil.org writes:
Please upload to security-master, I'll take care of it.
Thanks, Moritz!
Steven, you need a sponsor for that right? I can do the upload in a
minute if you haven't set up anything yet.
Yes, please go ahead whenever you're
Processing commands for cont...@bugs.debian.org:
# bts housekeeping:
# fixup versioning of fixed bugs that the bts considers to be not fixed
# reassign+affects bugs fixed in other packages
# unreproducible-or-not-a-bug must not be closed with a version, especially
not the reported one (or a
intrig...@debian.org wrote:
The fix for #766306 makes torsocks FTBFS on kfreebsd-*:
https://buildd.debian.org/status/package.php?p=torsocks
Hi,
SO_DOMAIN was only accepted into POSIX earlier this year:
http://austingroupbugs.net/view.php?id=840
it seems to be only available yet on Linux and
Steven Chamberlain wrote:
For FreeBSD I came up with the attached, hackish workaround
using SO_TYPE (widely available), and out of the available
protocols in PF_LOCAL (= AF_UNIX), assume that only
SOCK_{DGRAM,SEQPACKET,STREAM} are candidates for fd passing.
Actually it didn't work:
| $
Mapping stable-security to proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 05 Nov 2014 01:17:16 +
Source: kfreebsd-9
Binary: kfreebsd-source-9.0 kfreebsd-headers-9.0-2 kfreebsd-image-9.0-2-686-smp
kfreebsd-image-9-686-smp
Processing commands for cont...@bugs.debian.org:
tags 767583 + pending
Bug #767583 [src:kfreebsd-10] kfreebsd-10: ar9300_devid.h license restricts
modification
Added tag(s) pending.
thanks
Stopping processing here.
Please contact me if you need assistance.
--
767583:
Processing commands for cont...@bugs.debian.org:
tags 768108 + pending
Bug #768108 [src:kfreebsd-10] kfreebsd-10: CVE-2014-8476: getlogin kernel
memory disclosure
Added tag(s) pending.
thanks
Stopping processing here.
Please contact me if you need assistance.
--
768108:
11 matches
Mail list logo