Help with Wheezy CD testing on Saturday

2013-05-01 Thread Steve McIntyre
Hi folks, As we're expecting to release this Saturday (4th May) and I'm going to be preparing the CDs and DVDs to go with the release, it would be lovely if we have some volunteers to help test the images. We have been doing testing of the daily, weekly and Release Candidate images as they're prod

Re: Bug#690319: lookup fail to contact nslcd when first 1024 filedescriptor are already used (select)

2013-05-01 Thread Steven Chamberlain
Hi, I noticed (by chance) there is a problem with the squeeze-security patch for #690319; it introduces a regression on kfreebsd and has not built. I'm not sure where to find build logs of this, or if they are public, but I think it is due to using a non-standard EBADFD errno ("file descriptor i

Re: Bug#706414: CVE-2013-3266: Insufficient input validation in the NFS server

2013-05-01 Thread Christoph Egger
Florian Weimer writes: > * Christoph Egger: > >> Packages will be in people.d.o:~christoph soon (or shall I upload to >> security directly? > > Looks good. Please upload to security-master directly. You have to > rebuild with -sa, though, so that the upstream tarball is included in > the upload.

Bug#706414: CVE-2013-3266: Insufficient input validation in the NFS server

2013-05-01 Thread Christoph Egger
Hi! Steven Chamberlain writes: > Is that the correct version number for a security upload? (9.0-10+deb70.1) > > I'm more used to seeing something like +wheezy1 As +wheezy actually is larger that +jessie the +deb$something are the new style for stable version numbering as far as I understand

Re: Bug#706414: CVE-2013-3266: Insufficient input validation in the NFS server

2013-05-01 Thread Steven Chamberlain
Is that the correct version number for a security upload? (9.0-10+deb70.1) I'm more used to seeing something like +wheezy1 Regards, -- Steven Chamberlain ste...@pyro.eu.org -- To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listma

Re: Bug#706414: CVE-2013-3266: Insufficient input validation in the NFS server

2013-05-01 Thread Florian Weimer
* Christoph Egger: > Packages will be in people.d.o:~christoph soon (or shall I upload to > security directly? Looks good. Please upload to security-master directly. You have to rebuild with -sa, though, so that the upstream tarball is included in the upload. -- To UNSUBSCRIBE, email to debi

Bug#706414: CVE-2013-3266: Insufficient input validation in the NFS server

2013-05-01 Thread Christoph Egger
Florian Weimer writes: > * Christoph Egger: > >> Hi! >> >> Steven Chamberlain writes: >>> tags 706414 + pending >>> thanks >>> >>> I've applied upstream's patch in SVN, I'm running it now on my NFS >>> server and seems okay. >>> >>> Christoph, would you be able to do an upload of this to unstable

kfreebsd-9_9.0-11_kfreebsd-amd64.changes ACCEPTED into unstable

2013-05-01 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Mon, 29 Apr 2013 22:20:53 +0100 Source: kfreebsd-9 Binary: kfreebsd-source-9.0 kfreebsd-headers-9.0-2 kfreebsd-image-9.0-2-686-smp kfreebsd-image-9-686-smp kfreebsd-headers-9.0-2-686-smp kfreebsd-headers-9-686-smp kfr

Processing of kfreebsd-9_9.0-11_kfreebsd-amd64.changes

2013-05-01 Thread Debian FTP Masters
kfreebsd-9_9.0-11_kfreebsd-amd64.changes uploaded successfully to localhost along with the files: kfreebsd-9_9.0-11.dsc kfreebsd-9_9.0-11.debian.tar.gz kfreebsd-source-9.0_9.0-11_all.deb kfreebsd-headers-9.0-2_9.0-11_kfreebsd-amd64.deb kfreebsd-image-9.0-2-amd64_9.0-11_kfreebsd-amd64.deb

Processing of kfreebsd-9_9.0-11_kfreebsd-amd64.changes

2013-05-01 Thread Debian FTP Masters
kfreebsd-9_9.0-11_kfreebsd-amd64.changes uploaded successfully to ftp-master.debian.org along with the files: kfreebsd-9_9.0-11.dsc kfreebsd-9_9.0-11.debian.tar.gz kfreebsd-source-9.0_9.0-11_all.deb kfreebsd-headers-9.0-2_9.0-11_kfreebsd-amd64.deb kfreebsd-image-9.0-2-amd64_9.0-11_kfreeb

Bug#706414: marked as done (CVE-2013-3266: Insufficient input validation in the NFS server)

2013-05-01 Thread Debian Bug Tracking System
Your message dated Wed, 01 May 2013 13:04:01 + with message-id and subject line Bug#706414: fixed in kfreebsd-9 9.0-11 has caused the Debian Bug report #706414, regarding CVE-2013-3266: Insufficient input validation in the NFS server to be marked as done. This means that you claim that the pr

Re: Bug#706414: CVE-2013-3266: Insufficient input validation in the NFS server

2013-05-01 Thread Florian Weimer
* Christoph Egger: > Hi! > > Steven Chamberlain writes: >> tags 706414 + pending >> thanks >> >> I've applied upstream's patch in SVN, I'm running it now on my NFS >> server and seems okay. >> >> Christoph, would you be able to do an upload of this to unstable please? > > I'm building right now.

Re: Bug#706414: CVE-2013-3266: Insufficient input validation in the NFS server

2013-05-01 Thread Steven Chamberlain
On 01/05/13 11:14, Christoph Egger wrote: > [...] As it is too late for wheezy r0 it seems we'll > need to go through either security or stable-updates for wheezy Yes, we need to fix it in sid anyway. I think this (in kfreebsd-9) merits a DSA and the fix made available via security.d.o as soon as

Re: Bug#706414: CVE-2013-3266: Insufficient input validation in the NFS server

2013-05-01 Thread Christoph Egger
Hi! Steven Chamberlain writes: > tags 706414 + pending > thanks > > I've applied upstream's patch in SVN, I'm running it now on my NFS > server and seems okay. > > Christoph, would you be able to do an upload of this to unstable please? I'm building right now. As it is too late for wheezy r0 it