This is fixed in stable/9 in r255443.  The offending commit was already
reverted from the 9.2 branch prior to 9.2-RC3 for other reasons.



On 10 September 2013 07:31, Steven Chamberlain <ste...@pyro.eu.org> wrote:

> Package: src:kfreebsd-9
> Version: 9.2~svn253912-1
> Severity: grave
> Tags: security upstream
>
> http://security.FreeBSD.org/advisories/FreeBSD-SA-13:11.sendfile.asc
>
> This affects 9.2 only.  The advisory says this is fixed in r255444 but
> I'm not sure if that's correct.  SA-13:12 and SA-13:13 are fixed in that
> commit.
>
> -- System Information:
> Debian Release: 7.1
>   APT prefers proposed-updates
>   APT policy: (500, 'proposed-updates'), (500, 'stable')
> Architecture: kfreebsd-amd64 (x86_64)
>
> Kernel: kFreeBSD 9.0-2-amd64-xenhvm
> Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
>
> Versions of packages kfreebsd-image-9.0-2-amd64-xenhvm depends on:
> ii  devd           9.0-10+deb70.3
> ii  freebsd-utils  9.0-10+deb70.3
> ii  kbdcontrol     9.0-10+deb70.3
> ii  kldutils       9.0-10+deb70.3
>
> kfreebsd-image-9.0-2-amd64-xenhvm recommends no packages.
>
> kfreebsd-image-9.0-2-amd64-xenhvm suggests no packages.
>
> -- no debconf information
>
>
> --
> To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact
> listmas...@lists.debian.org
> Archive: http://lists.debian.org/522f02f9.1060...@pyro.eu.org
>
>

Reply via email to