Re: Roll call for porters of architectures in sid and testing

2013-09-01 Thread Kip Warner
On Sun, 2013-09-01 at 20:18 -0400, Adam Holland wrote:
> Hi, sorry I'm not a skilled programmer, I just have a historic SGI O2 to
> play around with a bit. If the hardware dies, I won't really have any
> reaspn to stay involved with this port.

Still cool that you have one though!

-- 
Kip Warner -- Software Engineer
OpenPGP encrypted/signed mail preferred
http://www.thevertigo.com


signature.asc
Description: This is a digitally signed message part


Re: Roll call for porters of architectures in sid and testing

2013-09-01 Thread Adam Holland
Hi, sorry I'm not a skilled programmer, I just have a historic SGI O2 to
play around with a bit. If the hardware dies, I won't really have any
reaspn to stay involved with this port.

-Adam


On Sun, Sep 1, 2013 at 3:33 AM, Niels Thykier  wrote:

>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Hi,
>
> As we announced in [LAST-BITS], we would like to get a better idea of
> that status of the ports, to make an informed decision about which
> port can be released with jessie. One of the steps is to get an
> overview of which of the porters are (still) active for each
> port. Once the results from the role-call are in, we will request
> other information about the status of the ports. In the meantime, feel
> free to update and collect info about the ports in the Debian wiki[WIKI].
>
> If you are (or intend to become) an active porter for the lifetime of
> jessie, then please send a signed email explaining your involvement in
> the port to the Release Team  before
> 1st of October 2013. Please explain the level of your involvement in
> the port.
>
> Feel free to use the following template as your reply:
>
> """
>   Hi,
>
>   I am an active porter for the following architectures and I intend
>   to continue this for the lifetime of the jessie release:
>
>   For , I
>   - test (most|all) packages on this architecture
>   - fix toolchain issues
>   - triage arch-specific bugs
>   - fix arch-related bugs
>   - maintain buildds
>   - ...
>
>   
>
>   
> """
>
> Niels, on behalf of the release team
>
> [LAST-BITS]
> http://lists.debian.org/debian-devel-announce/2013/08/msg6.html
>
> [WIKI] https://wiki.debian.org/ArchiveQualification/Jessie
>
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.4.14 (GNU/Linux)
>
> iQIcBAEBCAAGBQJSIu2TAAoJEAVLu599gGRC86EP/j/7FEZ9pxpTEHrBI41GTu6r
> nENS5kAZAuxFQHfYLtKexBcgneGd6cgdmr3cIoh1ZL9lJgXq74X8FL5IbWNqUw9S
> o9UQWpZJiwIIlH4fqSgFVLIphI0DQr7dXI7xcDIm4kl6Fdruo1tGxX8xqL23jzdP
> nQb3jrXv3bj5943MfWeCbODILv2N6qev9VtWeQ6Wmh8PvxRUl7VqgdQaeHtlMsUp
> TQT5fz0cw8gc2amlwlOZxaGDV2C8mHboJIKMEsu79BK4SlFSED9rXn4juFPUnAgG
> uADsMdBBqEIgSMN42cPHQju+KLfJe/+xScmlzzDS/d7aWWs02TibcQ1ZnPi+bcgp
> bd/Wa0lms+Fc2OpcuFle9Lwo+2B+ka1Dd3itm+D0SbmrxoGi6CuMMwydLcQbSJ73
> hHw9HJEIQr2x/ZItNPJrSvvj50rwYXcmFbxtVAwv2pFXfQ37iukYgAaaMvnwpNNJ
> 6dM1coCF9skNkXLO8rkZ+5aupGgjpS9BdKKAEQrPy/aoaW9KNCZrLQeA4C3QySBU
> OcCNBv7taSjVAVNszKtRIQpu2gzFGAV0u9Gj41qW1JzDHYrmAvMyGxrndOxTmaFr
> p05QWgcMsPhNvdHjd6sWLyzJ5NYUKksCPMRgCc0BEd6moIyrt7UFsp2+guJZPBJ0
> pffEJGK2iGtrWmJfElof
> =TUeZ
> -END PGP SIGNATURE-
>
>
> --
> To UNSUBSCRIBE, email to debian-mips-requ...@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact
> listmas...@lists.debian.org
> Archive: http://lists.debian.org/20130901073351.a92862...@thykier.net
>
>


kfreebsd-9_9.0-10+deb70.3_kfreebsd-amd64.changes ACCEPTED into proposed-updates->stable-new, proposed-updates

2013-09-01 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 22 Aug 2013 14:13:16 +0100
Source: kfreebsd-9
Binary: kfreebsd-source-9.0 kfreebsd-headers-9.0-2 kfreebsd-image-9.0-2-686-smp 
kfreebsd-image-9-686-smp kfreebsd-headers-9.0-2-686-smp 
kfreebsd-headers-9-686-smp kfreebsd-image-9.0-2-amd64 kfreebsd-image-9-amd64 
kfreebsd-headers-9.0-2-amd64 kfreebsd-headers-9-amd64 
kernel-image-9.0-2-amd64-di nic-modules-9.0-2-amd64-di 
nic-wireless-modules-9.0-2-amd64-di nic-shared-modules-9.0-2-amd64-di 
serial-modules-9.0-2-amd64-di ppp-modules-9.0-2-amd64-di 
cdrom-modules-9.0-2-amd64-di scsi-core-modules-9.0-2-amd64-di 
scsi-modules-9.0-2-amd64-di scsi-extra-modules-9.0-2-amd64-di 
plip-modules-9.0-2-amd64-di floppy-modules-9.0-2-amd64-di 
loop-modules-9.0-2-amd64-di ipv6-modules-9.0-2-amd64-di 
nls-core-modules-9.0-2-amd64-di ext2-modules-9.0-2-amd64-di 
isofs-modules-9.0-2-amd64-di ntfs-modules-9.0-2-amd64-di 
reiserfs-modules-9.0-2-amd64-di xfs-modules-9.0-2-amd64-di 
fat-modules-9.0-2-amd64-di zfs-modules-9.0-2-amd64-di 
nfs-modules-9.0-2-amd64-di nullfs-modules-9.0-2-amd64-di
 md-modules-9.0-2-amd64-di parport-modules-9.0-2-amd64-di 
sata-modules-9.0-2-amd64-di acpi-modules-9.0-2-amd64-di 
i2c-modules-9.0-2-amd64-di crypto-modules-9.0-2-amd64-di 
crypto-dm-modules-9.0-2-amd64-di mmc-core-modules-9.0-2-amd64-di 
mmc-modules-9.0-2-amd64-di sound-modules-9.0-2-amd64-di 
zlib-modules-9.0-2-amd64-di kfreebsd-image-9.0-2-486 kfreebsd-image-9-486 
kfreebsd-headers-9.0-2-486 kfreebsd-headers-9-486 kfreebsd-image-9.0-2-686 
kfreebsd-image-9-686 kfreebsd-headers-9.0-2-686 kfreebsd-headers-9-686 
kfreebsd-image-9.0-2-xen kfreebsd-image-9-xen kfreebsd-headers-9.0-2-xen 
kfreebsd-headers-9-xen kernel-image-9.0-2-486-di nic-modules-9.0-2-486-di 
nic-wireless-modules-9.0-2-486-di nic-shared-modules-9.0-2-486-di 
serial-modules-9.0-2-486-di ppp-modules-9.0-2-486-di cdrom-modules-9.0-2-486-di 
scsi-core-modules-9.0-2-486-di scsi-modules-9.0-2-486-di 
scsi-extra-modules-9.0-2-486-di plip-modules-9.0-2-486-di 
floppy-modules-9.0-2-486-di loop-modules-9.0-2-486-di
 ipv6-modules-9.0-2-486-di nls-core-modules-9.0-2-486-di 
ext2-modules-9.0-2-486-di isofs-modules-9.0-2-486-di ntfs-modules-9.0-2-486-di 
reiserfs-modules-9.0-2-486-di xfs-modules-9.0-2-486-di fat-modules-9.0-2-486-di 
zfs-modules-9.0-2-486-di nfs-modules-9.0-2-486-di nullfs-modules-9.0-2-486-di 
md-modules-9.0-2-486-di parport-modules-9.0-2-486-di sata-modules-9.0-2-486-di 
acpi-modules-9.0-2-486-di i2c-modules-9.0-2-486-di crypto-modules-9.0-2-486-di 
crypto-dm-modules-9.0-2-486-di mmc-core-modules-9.0-2-486-di 
mmc-modules-9.0-2-486-di sound-modules-9.0-2-486-di zlib-modules-9.0-2-486-di 
kfreebsd-image-9.0-2-malta kfreebsd-image-9-malta kfreebsd-headers-9.0-2-malta
 kfreebsd-headers-9-malta
Architecture: source all kfreebsd-amd64
Version: 9.0-10+deb70.3
Distribution: wheezy-security
Urgency: high
Maintainer: GNU/kFreeBSD Maintainers 
Changed-By: Steven Chamberlain 
Description: 
 acpi-modules-9.0-2-486-di - ACPI support modules (udeb)
 acpi-modules-9.0-2-amd64-di - ACPI support modules (udeb)
 cdrom-modules-9.0-2-486-di - Esoteric CDROM drivers (udeb)
 cdrom-modules-9.0-2-amd64-di - Esoteric CDROM drivers (udeb)
 crypto-dm-modules-9.0-2-486-di - devicemapper crypto module (udeb)
 crypto-dm-modules-9.0-2-amd64-di - devicemapper crypto module (udeb)
 crypto-modules-9.0-2-486-di - crypto modules (udeb)
 crypto-modules-9.0-2-amd64-di - crypto modules (udeb)
 ext2-modules-9.0-2-486-di - EXT2 filesystem support (udeb)
 ext2-modules-9.0-2-amd64-di - EXT2 filesystem support (udeb)
 fat-modules-9.0-2-486-di - FAT filesystem support (udeb)
 fat-modules-9.0-2-amd64-di - FAT filesystem support (udeb)
 floppy-modules-9.0-2-486-di - Floppy driver (udeb)
 floppy-modules-9.0-2-amd64-di - Floppy driver (udeb)
 i2c-modules-9.0-2-486-di - i2c support modules (udeb)
 i2c-modules-9.0-2-amd64-di - i2c support modules (udeb)
 ipv6-modules-9.0-2-486-di - IPv6 driver (udeb)
 ipv6-modules-9.0-2-amd64-di - IPv6 driver (udeb)
 isofs-modules-9.0-2-486-di - ISOFS filesystem support (udeb)
 isofs-modules-9.0-2-amd64-di - ISOFS filesystem support (udeb)
 kernel-image-9.0-2-486-di - FreeBSD kernel binary image for the Debian 
installer (udeb)
 kernel-image-9.0-2-amd64-di - FreeBSD kernel binary image for the Debian 
installer (udeb)
 kfreebsd-headers-9-486 - header files for kernel of FreeBSD 9 (meta-package)
 kfreebsd-headers-9-686 - header files for kernel of FreeBSD 9 (meta-package)
 kfreebsd-headers-9-686-smp - header files for kernel of FreeBSD 9 
(transitional package)
 kfreebsd-headers-9-amd64 - header files for kernel of FreeBSD 9 (meta-package)
 kfreebsd-headers-9-malta - header files for kernel of FreeBSD 9 (meta-package)
 kfreebsd-headers-9-xen - header files for kernel of FreeBSD 9 (meta-package)
 kfreebsd-headers-9.0-2 - Common architecture-specific header files for kernel 
of FreeBSD 9
 kfreebsd-headers-9.0-2-486 - header files for kernel of FreeBSD 9.0
 k

Bug#717958: marked as done (kfreebsd-9: CVE-2013-4851: nfsserver applies wrong credentials)

2013-09-01 Thread Debian Bug Tracking System
Your message dated Sun, 01 Sep 2013 21:47:09 +
with message-id 
and subject line Bug#717958: fixed in kfreebsd-9 9.0-10+deb70.3
has caused the Debian Bug report #717958,
regarding kfreebsd-9: CVE-2013-4851: nfsserver applies wrong credentials
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
717958: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717958
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:kfreebsd-9
Version: 9.0-10+deb70.2
Severity: grave
Tags: security upstream
Control: found -1 kfreebsd-9/9.0~svn223109-0.1

The FreeBSD NFS server implementation applies the wrong group
credentials (supplied by the client) to an authenticated NFS session in
specific configurations (exports defined using -mapall or -maproot with
-network or -host).

http://security.FreeBSD.org/advisories/FreeBSD-SA-13:08.nfsserver.asc

This was fixed in kfreebsd-10 since r244226, but the security
implications for kfreebsd-9 and kfreebsd-8 have just been realised.

-- System Information:
Debian Release: 7.1
  APT prefers proposed-updates
  APT policy: (500, 'proposed-updates'), (500, 'stable')
Architecture: kfreebsd-amd64 (x86_64)

Kernel: kFreeBSD 9.0-2-amd64-xenhvm
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages kfreebsd-image-9.0-2-amd64-xenhvm depends on:
ii  devd   9.0+ds1-11~deb7u1
ii  freebsd-utils  9.0+ds1-11~deb7u1
ii  kbdcontrol 9.0+ds1-11~deb7u1
ii  kldutils   9.0+ds1-11~deb7u1

kfreebsd-image-9.0-2-amd64-xenhvm recommends no packages.

kfreebsd-image-9.0-2-amd64-xenhvm suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: kfreebsd-9
Source-Version: 9.0-10+deb70.3

We believe that the bug you reported is fixed in the latest version of
kfreebsd-9, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 717...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steven Chamberlain  (supplier of updated kfreebsd-9 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 22 Aug 2013 14:13:16 +0100
Source: kfreebsd-9
Binary: kfreebsd-source-9.0 kfreebsd-headers-9.0-2 kfreebsd-image-9.0-2-686-smp 
kfreebsd-image-9-686-smp kfreebsd-headers-9.0-2-686-smp 
kfreebsd-headers-9-686-smp kfreebsd-image-9.0-2-amd64 kfreebsd-image-9-amd64 
kfreebsd-headers-9.0-2-amd64 kfreebsd-headers-9-amd64 
kernel-image-9.0-2-amd64-di nic-modules-9.0-2-amd64-di 
nic-wireless-modules-9.0-2-amd64-di nic-shared-modules-9.0-2-amd64-di 
serial-modules-9.0-2-amd64-di ppp-modules-9.0-2-amd64-di 
cdrom-modules-9.0-2-amd64-di scsi-core-modules-9.0-2-amd64-di 
scsi-modules-9.0-2-amd64-di scsi-extra-modules-9.0-2-amd64-di 
plip-modules-9.0-2-amd64-di floppy-modules-9.0-2-amd64-di 
loop-modules-9.0-2-amd64-di ipv6-modules-9.0-2-amd64-di 
nls-core-modules-9.0-2-amd64-di ext2-modules-9.0-2-amd64-di 
isofs-modules-9.0-2-amd64-di ntfs-modules-9.0-2-amd64-di 
reiserfs-modules-9.0-2-amd64-di xfs-modules-9.0-2-amd64-di 
fat-modules-9.0-2-amd64-di zfs-modules-9.0-2-amd64-di 
nfs-modules-9.0-2-amd64-di nullfs-modules-9.0-2-amd64-di
 md-modules-9.0-2-amd64-di parport-modules-9.0-2-amd64-di 
sata-modules-9.0-2-amd64-di acpi-modules-9.0-2-amd64-di 
i2c-modules-9.0-2-amd64-di crypto-modules-9.0-2-amd64-di 
crypto-dm-modules-9.0-2-amd64-di mmc-core-modules-9.0-2-amd64-di 
mmc-modules-9.0-2-amd64-di sound-modules-9.0-2-amd64-di 
zlib-modules-9.0-2-amd64-di kfreebsd-image-9.0-2-486 kfreebsd-image-9-486 
kfreebsd-headers-9.0-2-486 kfreebsd-headers-9-486 kfreebsd-image-9.0-2-686 
kfreebsd-image-9-686 kfreebsd-headers-9.0-2-686 kfreebsd-headers-9-686 
kfreebsd-image-9.0-2-xen kfreebsd-image-9-xen kfreebsd-headers-9.0-2-xen 
kfreebsd-headers-9-xen kernel-image-9.0-2-486-di nic-modules-9.0-2-486-di 
nic-wireless-modules-9.0-2-486-di nic-shared-modules-9.0-2-486-di 
serial-modules-9.0-2-486-di ppp-modules-9.0-2-486-di cdrom-modules-9.0-2-486-di 
scsi-core-modules-9.0-2-486-di scsi-modules-9.0-2-486-di 
scsi-extra-modules-9.0-2-486-di plip-modules-9.0-2-486-di 
floppy-modules-9.0-2-486-di loop-modules-9.0-2-486-di
 ipv6-modules-9.0-2-486-di 

Bug#720468: marked as done (kfreebsd-9: CVE-2013-3077: local ip_multicast buffer overflow)

2013-09-01 Thread Debian Bug Tracking System
Your message dated Sun, 01 Sep 2013 21:47:09 +
with message-id 
and subject line Bug#720468: fixed in kfreebsd-9 9.0-10+deb70.3
has caused the Debian Bug report #720468,
regarding kfreebsd-9: CVE-2013-3077: local ip_multicast buffer overflow
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
720468: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720468
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:kfreebsd-9
Version: 9.0-10+deb70.2
Severity: grave
Tags: security upstream

http://security.FreeBSD.org/advisories/FreeBSD-SA-13:09.ip_multicast.asc

> integer overflow in IP_MSFILTER

> An integer overflow in computing the size of a temporary buffer can
> result in a buffer which is too small for the requested operation.

> An unprivileged process can read or write pages of memory which
> belong to the kernel.  These may lead to exposure of sensitive
> information or allow privilege escalation.

kfreebsd-8 and kfreebsd-9 in wheezy will need the patch from r254629

kfreebsd-9 in jessie/sid will need updating to r254630 or later

kfreebsd-10 in experimental will need updating to r254629 or later

kfreebsd-8 8.1 in oldstable looks to be affected too (likely introduced
in r189592 or earlier).  The same patch should be suitable.

-- System Information:
Debian Release: 7.1
  APT prefers proposed-updates
  APT policy: (500, 'proposed-updates'), (500, 'stable')
Architecture: kfreebsd-amd64 (x86_64)

Kernel: kFreeBSD 9.0-2-amd64-xenhvm
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages kfreebsd-image-9.0-2-amd64-xenhvm depends on:
ii  devd   9.0-10+deb70.2
ii  freebsd-utils  9.0-10+deb70.2
ii  kbdcontrol 9.0-10+deb70.2
ii  kldutils   9.0-10+deb70.2

kfreebsd-image-9.0-2-amd64-xenhvm recommends no packages.

kfreebsd-image-9.0-2-amd64-xenhvm suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: kfreebsd-9
Source-Version: 9.0-10+deb70.3

We believe that the bug you reported is fixed in the latest version of
kfreebsd-9, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 720...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steven Chamberlain  (supplier of updated kfreebsd-9 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 22 Aug 2013 14:13:16 +0100
Source: kfreebsd-9
Binary: kfreebsd-source-9.0 kfreebsd-headers-9.0-2 kfreebsd-image-9.0-2-686-smp 
kfreebsd-image-9-686-smp kfreebsd-headers-9.0-2-686-smp 
kfreebsd-headers-9-686-smp kfreebsd-image-9.0-2-amd64 kfreebsd-image-9-amd64 
kfreebsd-headers-9.0-2-amd64 kfreebsd-headers-9-amd64 
kernel-image-9.0-2-amd64-di nic-modules-9.0-2-amd64-di 
nic-wireless-modules-9.0-2-amd64-di nic-shared-modules-9.0-2-amd64-di 
serial-modules-9.0-2-amd64-di ppp-modules-9.0-2-amd64-di 
cdrom-modules-9.0-2-amd64-di scsi-core-modules-9.0-2-amd64-di 
scsi-modules-9.0-2-amd64-di scsi-extra-modules-9.0-2-amd64-di 
plip-modules-9.0-2-amd64-di floppy-modules-9.0-2-amd64-di 
loop-modules-9.0-2-amd64-di ipv6-modules-9.0-2-amd64-di 
nls-core-modules-9.0-2-amd64-di ext2-modules-9.0-2-amd64-di 
isofs-modules-9.0-2-amd64-di ntfs-modules-9.0-2-amd64-di 
reiserfs-modules-9.0-2-amd64-di xfs-modules-9.0-2-amd64-di 
fat-modules-9.0-2-amd64-di zfs-modules-9.0-2-amd64-di 
nfs-modules-9.0-2-amd64-di nullfs-modules-9.0-2-amd64-di
 md-modules-9.0-2-amd64-di parport-modules-9.0-2-amd64-di 
sata-modules-9.0-2-amd64-di acpi-modules-9.0-2-amd64-di 
i2c-modules-9.0-2-amd64-di crypto-modules-9.0-2-amd64-di 
crypto-dm-modules-9.0-2-amd64-di mmc-core-modules-9.0-2-amd64-di 
mmc-modules-9.0-2-amd64-di sound-modules-9.0-2-amd64-di 
zlib-modules-9.0-2-amd64-di kfreebsd-image-9.0-2-486 kfreebsd-image-9-486 
kfreebsd-headers-9.0-2-486 kfreebsd-headers-9-486 kfreebsd-image-9.0-2-686 
kfreebsd-image-9-686 kfreebsd-headers-9.0-2-686 kfreebsd-headers-9-686 
kfreebsd-image-9.0-2-xen kfreebsd-image-9-xen kfreebsd-headers-9.0-2-xen 
kfreebsd-headers-9-xen kernel-image-9.0-2-486-di nic-modules-9.0-2-486-di 
nic-wireless-modules-9.0-2-486-di nic-shared-modules-9.0-2-486-di 
serial

Bug#720475: marked as done (kfreebsd-9: CVE-2013-5209: sctp kernel memory disclosure)

2013-09-01 Thread Debian Bug Tracking System
Your message dated Sun, 01 Sep 2013 21:47:09 +
with message-id 
and subject line Bug#720475: fixed in kfreebsd-9 9.0-10+deb70.3
has caused the Debian Bug report #720475,
regarding kfreebsd-9: CVE-2013-5209: sctp kernel memory disclosure
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
720475: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720475
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:kfreebsd-9
Version: 9.0-10+deb70.2
Severity: grave
Tags: security upstream
Control: found -1 kfreebsd-9/9.0~svn223109-0.1

http://security.FreeBSD.org/advisories/FreeBSD-SA-13:10.sctp.asc

> When initializing the SCTP state cookie being sent in INIT-ACK chunks,
> a buffer allocated from the kernel stack is not completely initialized.

> Fragments of kernel memory may be included in SCTP packets and
> transmitted over the network.  For each SCTP session, there are two
> separate instances in which a 4-byte fragment may be transmitted.

The commit suggests that one of these leaks may be platform specific,
depending on padding of struct timeval.  But the identification[] member
seems to allow for leakage on any platform.

kfreebsd-8 and kfreebsd-9 in wheezy will need the patch from r254338

kfreebsd-9 in jessie/sid will need updating to r254355 or later

kfreebsd-10 in experimental will need updating to r254338 or later

kfreebsd-8 8.1 in oldstable looks to be affected too (likely introduced
in r169378 or earlier).  The same patch should be suitable.

-- System Information:
Debian Release: 7.1
  APT prefers proposed-updates
  APT policy: (500, 'proposed-updates'), (500, 'stable')
Architecture: kfreebsd-amd64 (x86_64)

Kernel: kFreeBSD 9.0-2-amd64-xenhvm
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages kfreebsd-image-9.0-2-amd64-xenhvm depends on:
ii  devd   9.0-10+deb70.2
ii  freebsd-utils  9.0-10+deb70.2
ii  kbdcontrol 9.0-10+deb70.2
ii  kldutils   9.0-10+deb70.2

kfreebsd-image-9.0-2-amd64-xenhvm recommends no packages.

kfreebsd-image-9.0-2-amd64-xenhvm suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: kfreebsd-9
Source-Version: 9.0-10+deb70.3

We believe that the bug you reported is fixed in the latest version of
kfreebsd-9, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 720...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steven Chamberlain  (supplier of updated kfreebsd-9 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.8
Date: Thu, 22 Aug 2013 14:13:16 +0100
Source: kfreebsd-9
Binary: kfreebsd-source-9.0 kfreebsd-headers-9.0-2 kfreebsd-image-9.0-2-686-smp 
kfreebsd-image-9-686-smp kfreebsd-headers-9.0-2-686-smp 
kfreebsd-headers-9-686-smp kfreebsd-image-9.0-2-amd64 kfreebsd-image-9-amd64 
kfreebsd-headers-9.0-2-amd64 kfreebsd-headers-9-amd64 
kernel-image-9.0-2-amd64-di nic-modules-9.0-2-amd64-di 
nic-wireless-modules-9.0-2-amd64-di nic-shared-modules-9.0-2-amd64-di 
serial-modules-9.0-2-amd64-di ppp-modules-9.0-2-amd64-di 
cdrom-modules-9.0-2-amd64-di scsi-core-modules-9.0-2-amd64-di 
scsi-modules-9.0-2-amd64-di scsi-extra-modules-9.0-2-amd64-di 
plip-modules-9.0-2-amd64-di floppy-modules-9.0-2-amd64-di 
loop-modules-9.0-2-amd64-di ipv6-modules-9.0-2-amd64-di 
nls-core-modules-9.0-2-amd64-di ext2-modules-9.0-2-amd64-di 
isofs-modules-9.0-2-amd64-di ntfs-modules-9.0-2-amd64-di 
reiserfs-modules-9.0-2-amd64-di xfs-modules-9.0-2-amd64-di 
fat-modules-9.0-2-amd64-di zfs-modules-9.0-2-amd64-di 
nfs-modules-9.0-2-amd64-di nullfs-modules-9.0-2-amd64-di
 md-modules-9.0-2-amd64-di parport-modules-9.0-2-amd64-di 
sata-modules-9.0-2-amd64-di acpi-modules-9.0-2-amd64-di 
i2c-modules-9.0-2-amd64-di crypto-modules-9.0-2-amd64-di 
crypto-dm-modules-9.0-2-amd64-di mmc-core-modules-9.0-2-amd64-di 
mmc-modules-9.0-2-amd64-di sound-modules-9.0-2-amd64-di 
zlib-modules-9.0-2-amd64-di kfreebsd-image-9.0-2-486 kfreebsd-image-9-486 
kfreebsd-headers-9.0-2-486 kfreebsd-headers-9-486 kfreebsd-image-9.0-2-686 
kfreebsd-image-9-686 kfreebsd-headers-9.0-2-686 kfreebsd-headers-9-686 

Re: Bug#721540: RM: kfreebsd-8 -- ROM; obsoleted by kfreebsd-9

2013-09-01 Thread Steven Chamberlain
On 01/09/13 20:14, Robert Millan wrote:
> Please remove kfreebsd-8 from unstable as discussed in debian-bsd:
> https://lists.debian.org/debian-bsd/2013/08/msg00175.html

Another reason for its removal, is that the 8.x kernel series will not
have upstream security support for the jessie timeframe.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/5223958b.7000...@pyro.eu.org



Re: grub -18 *may* break your system

2013-09-01 Thread Robert Millan
Steven Chamberlain:
> On 01/09/13 18:04, Robert Millan wrote:
>> [...] maybe we should move the modules to /boot like
>> upstream does? And make /lib/modules a symlink or something.
> 
> Yes I think so.  It already works with grub2 (it resolves the symlink
> for paths used in grub.cfg), and it seems justified by the FHS too:
> 
> http://www.debian.org/doc/packaging-manuals/fhs/fhs-2.3.html#BOOTSTATICFILESOFTHEBOOTLOADER
>> /boot : Static files of the boot loader
>> Purpose:
>> This directory contains everything required for the boot process
>> [...] before the kernel begins executing user-mode programs.
> 
> whereas on Linux the required kernel modules would be already copied to
> /boot/initrd.img
> 
> The FHS docs also imply that /lib/modules may be a symlink:
> 
>> The following directories, or symbolic links to directories, must be in 
>> /lib, if the corresponding subsystem is installed:
>>
>> DirectoryDescription
>> modules  Loadable kernel modules (optional)

Thanks for the research. I've just made a patch for this, and partially
tested it on kfreebsd-10. If there is no opposition I'll commit it after
kernel-wedge is updated (it required a fix to handle symlinks).

-- 
Robert Millan
Index: debian/control.in
===
--- debian/control.in	(revision 4929)
+++ debian/control.in	(working copy)
@@ -11,7 +11,7 @@
  @cc_pkg@, libdb-dev,
  libbsd-dev (>= 0.3.0), pkg-config,
  libsbuf-dev (>= 9.0+ds1-2),
- kernel-wedge (>= 2.79) [kfreebsd-any],
+ kernel-wedge (>= 2.88) [kfreebsd-any],
 Standards-Version: 3.9.2
 
 Package: kfreebsd-source-@version@
Index: debian/rules
===
--- debian/rules	(revision 4930)
+++ debian/rules	(working copy)
@@ -157,8 +157,8 @@
 	# Change ident to the kernel version
 	sed -i -e 's/^i=.*/i="Debian $* ($(full_version))"/g' $(FLAVOR_DIR)-$*/sys/conf/newvers.sh
 
-	# Set /lib/modules/${RELEASE} as module dir
-	sed -i -e 's,^KODIR?=.*,KODIR="/lib/modules/$(version)-$(abiname)-$*",g' $(FLAVOR_DIR)-$*/sys/conf/kern.pre.mk
+	# Override module dir
+	sed -i -e 's,^KODIR?=.*,KODIR="/boot/modules/$(version)-$(abiname)-$*",g' $(FLAVOR_DIR)-$*/sys/conf/kern.pre.mk
 
 	# Always set explicit link target to match with ld's implicit target (needed
 	# to build on non-kFreeBSD)
@@ -212,7 +212,7 @@
 	dh_testroot
 	dh_clean -k -pkfreebsd-image-$(version)-$(abiname)-$*
 
-	mkdir -p $(IMAGE_PACKAGE)-$*/{boot,lib/modules/$(version)-$(abiname)-$*}
+	mkdir -p $(IMAGE_PACKAGE)-$*/boot/modules/$(version)-$(abiname)-$*
 
 	# make the install target happy
 	install -o root -g root -m 644 \
@@ -233,12 +233,12 @@
 
 	# now install the kernel
 	$(MAKE) CC=$(cc_cmd) -C $(FLAVOR_DIR)-$*/sys/$(kfreebsd_cpu)/compile/$(configfile) DESTDIR=$(IMAGE_PACKAGE)-$* install
-	mv $(IMAGE_PACKAGE)-$*/lib/modules/$(version)-$(abiname)-$*/kernel $(IMAGE_PACKAGE)-$*/boot/kfreebsd-$(version)-$(abiname)-$*
+	mv $(IMAGE_PACKAGE)-$*/boot/modules/$(version)-$(abiname)-$*/kernel $(IMAGE_PACKAGE)-$*/boot/kfreebsd-$(version)-$(abiname)-$*
 	chmod 644 $(IMAGE_PACKAGE)-$*/boot/kfreebsd-$(version)-$(abiname)-$*
 	gzip -9 $(IMAGE_PACKAGE)-$*/boot/kfreebsd-$(version)-$(abiname)-$*
 
 	# fix broken perms in module dir
-	-chmod 644 $(IMAGE_PACKAGE)-$*/lib/modules/$(version)-$(abiname)-$*/*
+	-chmod 644 $(IMAGE_PACKAGE)-$*/boot/modules/$(version)-$(abiname)-$*/*
 
 	# remove loader.conf (part of kfreebsd-loader)
 	rm -f $(IMAGE_PACKAGE)-$*/boot/loader.conf
@@ -247,6 +247,13 @@
 	# remove device.hints (built into kernel)
 	rm -f $(IMAGE_PACKAGE)-$*/boot/device.hints
 
+	# compatibility symlink
+	mkdir -p $(IMAGE_PACKAGE)-$*/lib/modules
+	ln -s \
+		../../boot/modules/$(version)-$(abiname)-$* \
+		$(IMAGE_PACKAGE)-$*/lib/modules/$(version)-$(abiname)-$*
+
+
 	# README file
 	mkdir -p $(IMAGE_PACKAGE)-$*/usr/share/doc/kfreebsd-image-$(version)-$(abiname)-$*
 	install -p -o root -g root -m 644 \
@@ -333,12 +340,12 @@
 	dh_installdocs -s
 	dh_installchangelogs -s
 	dh_link -s
-	dh_strip -s -X/boot -X/lib/modules
+	dh_strip -s -X/boot
 	dh_compress -s
 	dh_fixperms -s
 	dh_makeshlibs -s
 	dh_installdeb -s
-	dh_shlibdeps -s -X/boot -X/lib/modules
+	dh_shlibdeps -s -X/boot
 	dh_gencontrol -s
 	dh_md5sums -s
 	dh_builddeb -s -- -Zxz


Re: kfreebsd-8

2013-09-01 Thread Robert Millan
Steven Chamberlain:
> On 01/09/13 18:09, Robert Millan wrote:
>> Okay, so let's just remove kfreebsd-8 for now, and make D-I kfreebsd-9 only?
> 
> Yes that's what I'd suggest for now.

Request just filed. As for D-I, I made it kfreebsd-9 only, but also
added (optional) targets for kfreebsd-10. They may come useful some day.

-- 
Robert Millan


-- 
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/5223926c.3060...@debian.org



RM: kfreebsd-8 -- ROM; obsoleted by kfreebsd-9

2013-09-01 Thread Robert Millan
Package: ftp.debian.org
Severity: normal

Hello FTP team,

Please remove kfreebsd-8 from unstable as discussed in debian-bsd:

https://lists.debian.org/debian-bsd/2013/08/msg00175.html

Thanks!

-- 
Robert Millan


-- 
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/5223920e.5000...@debian.org



Re: kfreebsd-8

2013-09-01 Thread Steven Chamberlain
On 01/09/13 18:09, Robert Millan wrote:
> Okay, so let's just remove kfreebsd-8 for now, and make D-I kfreebsd-9 only?

Yes that's what I'd suggest for now.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/52237780.8040...@pyro.eu.org



Re: grub -18 *may* break your system

2013-09-01 Thread Steven Chamberlain
On 01/09/13 18:04, Robert Millan wrote:
> [...] maybe we should move the modules to /boot like
> upstream does? And make /lib/modules a symlink or something.

Yes I think so.  It already works with grub2 (it resolves the symlink
for paths used in grub.cfg), and it seems justified by the FHS too:

http://www.debian.org/doc/packaging-manuals/fhs/fhs-2.3.html#BOOTSTATICFILESOFTHEBOOTLOADER
> /boot : Static files of the boot loader
> Purpose:
> This directory contains everything required for the boot process
> [...] before the kernel begins executing user-mode programs.

whereas on Linux the required kernel modules would be already copied to
/boot/initrd.img

The FHS docs also imply that /lib/modules may be a symlink:

> The following directories, or symbolic links to directories, must be in /lib, 
> if the corresponding subsystem is installed:
> 
> Directory Description
> modules   Loadable kernel modules (optional)

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/5223769c.2000...@pyro.eu.org



Re: kfreebsd-8

2013-09-01 Thread Robert Millan
Steven Chamberlain:
> Hi,
> 
> On 29/08/13 13:58, Robert Millan wrote:
>> Again, if I don't hear anyone against this, I'll go ahead and:
>>
>> - Upload kfreebsd-10 (with abiname=0) to sid.
>> - Make D-I a kfreebsd-9 / kfreebsd-10 dual boot.
>> - Request removal of kfreebsd-8.
> 
> BTW I'm okay with removal of kfreebsd-8, I was just unsure when that
> should happen.  I'm also unsure if kfreebsd-10 should go into sid yet.
> Whatever you and others think is best.

Okay, so let's just remove kfreebsd-8 for now, and make D-I kfreebsd-9 only?

-- 
Robert Millan


-- 
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/522374b3.3070...@debian.org



Re: grub -18 *may* break your system

2013-09-01 Thread Robert Millan
Steven Chamberlain:
> A few times I've had GRUB unable to boot from ZFS for various reasons.
> Now I prefer to make /boot a separate partition, and also move
> /lib/modules into /boot/, making it a symlink to there.  That way
> everything needed to boot the kernel is on plain UFS, but everything
> else still ZFS.

Sounds sensible... maybe we should move the modules to /boot like
upstream does? And make /lib/modules a symlink or something.

-- 
Robert Millan


-- 
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/522373b5.1000...@debian.org



Re: Roll call for porters of architectures in sid and testing

2013-09-01 Thread Christoph Egger
Hi,

I am an active porter for the following architectures and I intend
to continue this for the lifetime of the jessie release:

For kfreebsd-*, I
- test packages on this architecture

This includes running a Desktop (Notebook) System on testing and am
therefore testing the relevant stack every day

- triage arch-specific bugs

I've been working on regressions for some time and plan to continue
there (in the past I've worked e.g. on libxcb, emacs and the kernel
+ lots of build failures)

- fix arch-related bugs
- maintain buildds

I am a DD

Christoph


pgpRxFq23Evwb.pgp
Description: PGP signature


Bug#721504: booting from zfs fails with "checksum verification failed"

2013-09-01 Thread Christoph Egger
Package: grub-pc
Version: 2.00-18
Severity: grave

Upgrading grub from -15 to -18 causes a immediate boot failure. Grub gets
into rescue mode with "checksum verification failed" and `insmod normal`
fails with the same message. Booting into a live system the zfs imports
just fine and after downgrading grub everything's back to normal.

  Christoph

-- Package-specific info:

*** BEGIN /proc/mounts
/dev/da0s1 /mnt/passport ext2fs rw 0 0
*** END /proc/mounts

*** BEGIN /boot/grub/device.map
*** END /boot/grub/device.map

*** BEGIN /boot/grub/grub.cfg
#
# DO NOT EDIT THIS FILE
#
# It is automatically generated by grub-mkconfig using templates
# from /etc/grub.d and settings from /etc/default/grub
#

### BEGIN /etc/grub.d/00_header ###
if [ -s $prefix/grubenv ]; then
  load_env
fi
set default="0"

if [ x"${feature_menuentry_id}" = xy ]; then
  menuentry_id_option="--id"
else
  menuentry_id_option=""
fi

export menuentry_id_option

if [ "${prev_saved_entry}" ]; then
  set saved_entry="${prev_saved_entry}"
  save_env saved_entry
  set prev_saved_entry=
  save_env prev_saved_entry
  set boot_once=true
fi

function savedefault {
  if [ -z "${boot_once}" ]; then
saved_entry="${chosen}"
save_env saved_entry
  fi
}

function load_video {
  if [ x$feature_all_video_module = xy ]; then
insmod all_video
  else
insmod efi_gop
insmod efi_uga
insmod ieee1275_fb
insmod vbe
insmod vga
insmod video_bochs
insmod video_cirrus
  fi
}

if [ x$feature_default_font_path = xy ] ; then
   font=unicode
else
insmod part_msdos
insmod zfs
if [ x$feature_platform_search_hint = xy ]; then
  search --no-floppy --fs-uuid --set=root  d610af6cf49f9371
else
  search --no-floppy --fs-uuid --set=root d610af6cf49f9371
fi
font="/root/@/usr/share/grub/unicode.pf2"
fi

if loadfont $font ; then
  set gfxmode=auto
  load_video
  insmod gfxterm
  set locale_dir=$prefix/locale
  set lang=en_US
  insmod gettext
fi
terminal_output gfxterm
set timeout=5
### END /etc/grub.d/00_header ###

### BEGIN /etc/grub.d/05_debian_theme ###
set menu_color_normal=cyan/blue
set menu_color_highlight=white/blue
### END /etc/grub.d/05_debian_theme ###

### BEGIN /etc/grub.d/10_kfreebsd ###
menuentry 'Debian GNU/kFreeBSD' --class debian --class gnu-kfreebsd --class gnu 
--class os $menuentry_id_option 'kfreebsd-simple-d610af6cf49f9371' {
insmod part_msdos
insmod zfs
if [ x$feature_platform_search_hint = xy ]; then
  search --no-floppy --fs-uuid --set=root  d610af6cf49f9371
else
  search --no-floppy --fs-uuid --set=root d610af6cf49f9371
fi
echo'Loading kernel of FreeBSD 10.0-0-amd64 ...'
kfreebsd/root/@/boot/kfreebsd-10.0-0-amd64.gz 
kfreebsd_loadenv/root/@/boot/device.hints
insmod part_msdos
insmod zfs
if [ x$feature_platform_search_hint = xy ]; then
  search --no-floppy --fs-uuid --set=root  d610af6cf49f9371
else
  search --no-floppy --fs-uuid --set=root d610af6cf49f9371
fi
kfreebsd_module_elf /root/@/lib/modules/10.0-0-amd64/opensolaris.ko
insmod part_msdos
insmod zfs
if [ x$feature_platform_search_hint = xy ]; then
  search --no-floppy --fs-uuid --set=root  d610af6cf49f9371
else
  search --no-floppy --fs-uuid --set=root d610af6cf49f9371
fi
kfreebsd_module /root/@/boot/zfs/zpool.cache 
type=/boot/zfs/zpool.cache
insmod part_msdos
insmod zfs
if [ x$feature_platform_search_hint = xy ]; then
  search --no-floppy --fs-uuid --set=root  d610af6cf49f9371
else
  search --no-floppy --fs-uuid --set=root d610af6cf49f9371
fi
kfreebsd_module_elf /root/@/lib/modules/10.0-0-amd64/zfs.ko
set kFreeBSD.vfs.root.mountfrom=zfs:base/root
set kFreeBSD.vfs.root.mountfrom.options=rw
set kFreeBSD.vfs.zfs.trim_disable=0
set kFreeBSD.kern.hz=100
set kFreeBSD.hint.atrtc.0.clock=0
set kFreeBSD.hint.p4tcc.0.disabled=1
set kFreeBSD.hint.acpi_throttle.0.disabled=1
set kFreeBSD.hint.apic.0.clock=0
}
submenu 'Advanced options for Debian GNU/kFreeBSD' $menuentry_id_option 
'kfreebsd-advanced-d610af6cf49f9371' {
menuentry 'Debian GNU/kFreeBSD, with kFreeBSD 10.0-0-amd64' --class 
debian --class gnu-kfreebsd --class gnu --class os $menuentry_id_option 
'kfreebsd-10.0-0-amd64-advanced-d610af6cf49f9371' {
insmod part_msdos
insmod zfs
if [ x$feature_platform_search_hint = xy ]; then
  search --no-floppy --fs-uuid --set=root  d610af6cf49f9371
else
  search --no-floppy --fs-uuid --set=root d610af6cf49f9371
fi
echo'Loading kernel of 

Roll call for porters of architectures in sid and testing

2013-09-01 Thread Niels Thykier

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi,

As we announced in [LAST-BITS], we would like to get a better idea of
that status of the ports, to make an informed decision about which
port can be released with jessie. One of the steps is to get an
overview of which of the porters are (still) active for each
port. Once the results from the role-call are in, we will request
other information about the status of the ports. In the meantime, feel
free to update and collect info about the ports in the Debian wiki[WIKI].

If you are (or intend to become) an active porter for the lifetime of
jessie, then please send a signed email explaining your involvement in
the port to the Release Team  before
1st of October 2013. Please explain the level of your involvement in
the port.

Feel free to use the following template as your reply:

"""
  Hi,
  
  I am an active porter for the following architectures and I intend
  to continue this for the lifetime of the jessie release:

  For , I
  - test (most|all) packages on this architecture
  - fix toolchain issues
  - triage arch-specific bugs
  - fix arch-related bugs
  - maintain buildds
  - ...
  
  
  
  
"""

Niels, on behalf of the release team

[LAST-BITS] http://lists.debian.org/debian-devel-announce/2013/08/msg6.html

[WIKI] https://wiki.debian.org/ArchiveQualification/Jessie

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
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=TUeZ
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130901073351.a92862...@thykier.net