Bug#328504: Rise symbol report

2007-05-15 Thread lilaben moneypenny

http://www.imagehost.ro/pict//1509004146494c897d42c.gif

Do click browsers refresh button try.
Gnome kde testing internally debian fedora knoppix residents.
Pop, rather iewith ancient pos, laying.
Police blotter announce preview. Slightly, obviously lacking sufficient 
usersquot happyscore ami feel.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#328831: Terrific gains possible!

2007-05-15 Thread NIELS miller

http://www.imagehost.ro/viewer.php?img=1509011746494caddbcd3

Pmsounds spyware virus pctool!
Things wrong, be my specific left, screen becomes!
Choose mac ubuntu except, certainly crash. Optimize gt technical products, 
locate vistaget stepbystep.
Realities amanother, brilliant bit, nonsense pcfool. Bullied leaving scare 
reminder pops. Variable, dump installer youhave gl obscure webaddress binary 
atleast.
Investing future pastby mccains.
Answerby, word, answer etwinhec deliver goodsmay.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#239427: Insane report

2007-05-15 Thread Boone deskins

http://img15.imgspot.com/u/07/134/02/W29GA.jpg

The resource, on root!
On root, password products obsolete release torrent.
The resource on root password products.
Beryl dell live xeon is required by debian etch.
Nvidia this the, resource on root, password products, obsolete.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



r2222 - in glibc-package/branches/glibc-branch-etch/debian: . patches

2007-05-15 Thread madcoder
Author: madcoder
Date: 2007-05-15 12:18:37 + (Tue, 15 May 2007)
New Revision: 

Modified:
   glibc-package/branches/glibc-branch-etch/debian/changelog
   glibc-package/branches/glibc-branch-etch/debian/patches/series
Log:
prepare etch2 with vprintf bug fixed.



Modified: glibc-package/branches/glibc-branch-etch/debian/changelog
===
--- glibc-package/branches/glibc-branch-etch/debian/changelog   2007-05-15 
03:00:35 UTC (rev 2221)
+++ glibc-package/branches/glibc-branch-etch/debian/changelog   2007-05-15 
12:18:37 UTC (rev )
@@ -1,3 +1,10 @@
+glibc (2.3.6.ds1-13etch2) UNRELEASED; urgency=low
+
+  * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales
+and printf exploding the stack with large width specifiers.
+
+ -- Pierre Habouzit [EMAIL PROTECTED]  Tue, 15 May 2007 13:58:50 +0200
+
 glibc (2.3.6.ds1-13etch1) stable; urgency=low
 
   [ Pierre Habouzit ]

Modified: glibc-package/branches/glibc-branch-etch/debian/patches/series
===
--- glibc-package/branches/glibc-branch-etch/debian/patches/series  
2007-05-15 03:00:35 UTC (rev 2221)
+++ glibc-package/branches/glibc-branch-etch/debian/patches/series  
2007-05-15 12:18:37 UTC (rev )
@@ -190,3 +190,4 @@
 any/cvs-sunrpc-xdrmem_setpos.diff
 any/cvs-getent-wrong-struct-size.diff -p0
 any/cvs-sunrpc-64bits-svc_getreqset.diff -p0
+any/cvs-vfprintf-stack-smashing.diff


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



r2223 - in glibc-package/branches/glibc-branch-etch/debian: . patches

2007-05-15 Thread madcoder
Author: madcoder
Date: 2007-05-15 12:19:01 + (Tue, 15 May 2007)
New Revision: 2223

Modified:
   glibc-package/branches/glibc-branch-etch/debian/changelog
   glibc-package/branches/glibc-branch-etch/debian/patches/series
Log:
close the nfs memory leak bug as well.



Modified: glibc-package/branches/glibc-branch-etch/debian/changelog
===
--- glibc-package/branches/glibc-branch-etch/debian/changelog   2007-05-15 
12:18:37 UTC (rev )
+++ glibc-package/branches/glibc-branch-etch/debian/changelog   2007-05-15 
12:19:01 UTC (rev 2223)
@@ -1,9 +1,11 @@
-glibc (2.3.6.ds1-13etch2) UNRELEASED; urgency=low
+glibc (2.3.6.ds1-13etch2) stable; urgency=low
 
   * patches/any/cvs-vfprintf-stack-smashing.diff: fix issue with 8bits locales
 and printf exploding the stack with large width specifiers.
+  * patches/any/cvs-getnetgrent_r-memory-leak.diff: fix memory leak in
+getnetgrent_r. Closes: #423369.
 
- -- Pierre Habouzit [EMAIL PROTECTED]  Tue, 15 May 2007 13:58:50 +0200
+ -- Pierre Habouzit [EMAIL PROTECTED]  Tue, 15 May 2007 14:07:40 +0200
 
 glibc (2.3.6.ds1-13etch1) stable; urgency=low
 

Modified: glibc-package/branches/glibc-branch-etch/debian/patches/series
===
--- glibc-package/branches/glibc-branch-etch/debian/patches/series  
2007-05-15 12:18:37 UTC (rev )
+++ glibc-package/branches/glibc-branch-etch/debian/patches/series  
2007-05-15 12:19:01 UTC (rev 2223)
@@ -191,3 +191,4 @@
 any/cvs-getent-wrong-struct-size.diff -p0
 any/cvs-sunrpc-64bits-svc_getreqset.diff -p0
 any/cvs-vfprintf-stack-smashing.diff
+any/cvs-getnetgrent_r-memory-leak.diff


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: closing 423369

2007-05-15 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.10.4
 close 423369 2.5
Bug#423369: libc6: Memory leak in innetgr (kills nfs-kernel-server after a 
while)
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 2.5, send any further explanations to Rik Theys 
[EMAIL PROTECTED]


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



r2225 - glibc-package/branches/glibc-branch-etch/debian/patches/any

2007-05-15 Thread madcoder
Author: madcoder
Date: 2007-05-15 12:30:58 + (Tue, 15 May 2007)
New Revision: 2225

Added:
   
glibc-package/branches/glibc-branch-etch/debian/patches/any/cvs-vfprintf-stack-smashing.diff
Log:
missing file

Added: 
glibc-package/branches/glibc-branch-etch/debian/patches/any/cvs-vfprintf-stack-smashing.diff
===
--- 
glibc-package/branches/glibc-branch-etch/debian/patches/any/cvs-vfprintf-stack-smashing.diff
(rev 0)
+++ 
glibc-package/branches/glibc-branch-etch/debian/patches/any/cvs-vfprintf-stack-smashing.diff
2007-05-15 12:30:58 UTC (rev 2225)
@@ -0,0 +1,55 @@
+2007-05-02  Jakub Jelinek  [EMAIL PROTECTED]
+
+   * stdio-common/vfprintf.c (process_string_arg): Use a VLA rather than
+   fixed length array for ignore.
+
+2007-04-30  Ulrich Drepper  [EMAIL PROTECTED]
+
+   [BZ #4438]
+   * stdio-common/vfprintf.c (process_string_arg): Don't overflow the
+   stack for large precisions.
+
+===
+RCS file: /cvs/glibc/libc/stdio-common/vfprintf.c,v
+retrieving revision 1.135
+retrieving revision 1.137
+Index: glibc-2.5/stdio-common/vfprintf.c
+===
+--- glibc-2.5.orig/stdio-common/vfprintf.c 2006-05-02 22:25:15.0 
+0200
 glibc-2.5/stdio-common/vfprintf.c  2007-05-04 11:26:16.049828248 +0200
+@@ -1159,19 +1159,26 @@
+   else  \
+ {   \
+   /* In case we have a multibyte character set the  \
+- situation is more compilcated.  We must not copy   \
++ situation is more complicated.  We must not copy   \
+  bytes at the end which form an incomplete character. */\
+-  wchar_t ignore[prec]; \
++  size_t ignore_size = (unsigned) prec  1024 ? 1024 : prec;\
++  wchar_t ignore[ignore_size];  \
+   const char *str2 = string;\
+-  mbstate_t ps; \
++  const char *strend = string + prec;   \
++  if (strend  string)  \
++strend = (const char *) UINTPTR_MAX;\
+ \
++  mbstate_t ps; \
+   memset (ps, '\0', sizeof (ps));  \
+-  if (__mbsnrtowcs (ignore, str2, prec, prec, ps) \
+-  == (size_t) -1)   \
+-{   \
+-  done = -1;\
+-  goto all_done;\
+-}   \
++\
++  while (str2 != NULL  str2  strend) \
++if (__mbsnrtowcs (ignore, str2, strend - str2, \
++  ignore_size, ps) == (size_t) -1) \
++  { \
++done = -1;  \
++goto all_done;  \
++  } \
++\
+   if (str2 == NULL) \
+ len = strlen (string);  \
+   else  \


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



r2226 - glibc-package/branches/glibc-branch-etch/debian/patches/any

2007-05-15 Thread madcoder
Author: madcoder
Date: 2007-05-15 12:36:36 + (Tue, 15 May 2007)
New Revision: 2226

Added:
   
glibc-package/branches/glibc-branch-etch/debian/patches/any/cvs-getnetgrent_r-memory-leak.diff
Log:
missing file part2, the part where I hide

Added: 
glibc-package/branches/glibc-branch-etch/debian/patches/any/cvs-getnetgrent_r-memory-leak.diff
===
--- 
glibc-package/branches/glibc-branch-etch/debian/patches/any/cvs-getnetgrent_r-memory-leak.diff
  (rev 0)
+++ 
glibc-package/branches/glibc-branch-etch/debian/patches/any/cvs-getnetgrent_r-memory-leak.diff
  2007-05-15 12:36:36 UTC (rev 2226)
@@ -0,0 +1,37 @@
+#2005-09-24  Jakub Jelinek  [EMAIL PROTECTED]
+#
+#   * inet/getnetgrent_r.c (innetgr): Call endfct even if result != 0.
+#   Return 1 only if result == 1.  Patch by Benoit Capelle.
+#
+Index: glibc-2.3.6/inet/getnetgrent_r.c
+===
+--- glibc-2.3.6.orig/inet/getnetgrent_r.c  2007-05-15 14:34:38.302725105 
+0200
 glibc-2.3.6/inet/getnetgrent_r.c   2007-05-15 14:34:51.427473042 +0200
+@@ -405,9 +405,6 @@
+   }
+   }
+ 
+-if (result != 0)
+-  break;
+-
+ /* If we found one service which does know the given
+netgroup we don't try further.  */
+ status = NSS_STATUS_RETURN;
+@@ -417,6 +414,9 @@
+ if (__nss_lookup (entry.nip, endnetgrent, endfct.ptr) == 0)
+   (*endfct.f) (entry);
+ 
++if (result != 0)
++  break;
++
+ /* Look for the next service.  */
+ no_more = __nss_next (entry.nip, setnetgrent,
+   setfct.ptr, status, 0);
+@@ -439,6 +439,6 @@
+   /* Free the memory.  */
+   free_memory (entry);
+ 
+-  return result;
++  return result == 1;
+ }
+ libc_hidden_def (innetgr)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



r2224 - glibc-package/trunk/debian

2007-05-15 Thread aurel32
Author: aurel32
Date: 2007-05-15 12:28:34 + (Tue, 15 May 2007)
New Revision: 2224

Modified:
   glibc-package/trunk/debian/changelog
Log:
  * debian/local/etc_init.d/glibc.sh: fix a typo.  Closes: #423870.



Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2007-05-15 12:19:01 UTC (rev 
2223)
+++ glibc-package/trunk/debian/changelog2007-05-15 12:28:34 UTC (rev 
2224)
@@ -8,8 +8,11 @@
   * debian/sysdeps/depflags.pl: Clean out relationships for packages
 that do not exist in sarge or later.
 
- -- Clint Adams [EMAIL PROTECTED]  Tue, 08 May 2007 15:12:20 -0400
+  [ Aurelien Jarno ]
+  * debian/local/etc_init.d/glibc.sh: fix a typo.  Closes: #423870. 
 
+ -- Aurelien Jarno [EMAIL PROTECTED]  Tue, 15 May 2007 14:27:59 +0200
+
 glibc (2.5-7) unstable; urgency=low
 
   * debian/sysdeps/i386.mk: switch from --includir= to amd64_includedir.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of glibc_2.3.6.ds1-13etch2_amd64.changes

2007-05-15 Thread Archive Administrator
glibc_2.3.6.ds1-13etch2_amd64.changes uploaded successfully to localhost
along with the files:
  glibc_2.3.6.ds1-13etch2.dsc
  glibc_2.3.6.ds1-13etch2.diff.gz
  glibc-doc_2.3.6.ds1-13etch2_all.deb
  locales_2.3.6.ds1-13etch2_all.deb
  libc6_2.3.6.ds1-13etch2_amd64.deb
  libc6-dev_2.3.6.ds1-13etch2_amd64.deb
  libc6-prof_2.3.6.ds1-13etch2_amd64.deb
  libc6-pic_2.3.6.ds1-13etch2_amd64.deb
  locales-all_2.3.6.ds1-13etch2_amd64.deb
  libc6-i386_2.3.6.ds1-13etch2_amd64.deb
  libc6-dev-i386_2.3.6.ds1-13etch2_amd64.deb
  nscd_2.3.6.ds1-13etch2_amd64.deb
  libc6-dbg_2.3.6.ds1-13etch2_amd64.deb
  libc6-udeb_2.3.6.ds1-13etch2_amd64.udeb
  libnss-dns-udeb_2.3.6.ds1-13etch2_amd64.udeb
  libnss-files-udeb_2.3.6.ds1-13etch2_amd64.udeb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



glibc override disparity

2007-05-15 Thread Debian Installer
There are disparities between your recently accepted upload and the
override file for the following file(s):

libc6-i386_2.3.6.ds1-13etch2_amd64.deb: package says priority is optional, 
override says standard.

Either the package or the override file is incorrect.  If you think
the override is correct and the package wrong please fix the package
so that this disparity is fixed in the next upload.  If you feel the
override is incorrect then please reply to this mail and explain why.

[NB: this is an automatically generated mail; if you replied to one
like it before and have not received a response yet, please ignore
this mail.  Your reply needs to be processed by a human and will be in
due course, but until then the installer will send these automated
mails; sorry.]

--
Debian distribution maintenance software

(This message was generated automatically; if you believe that there
is a problem with it please contact the archive administrators by
mailing [EMAIL PROTECTED])


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#424057: libc6: internal error: symidx out of range of fptr table

2007-05-15 Thread Frans Pop
Package: libc6
Version: 2.5-7
Severity: important

Today I saw this error for the second time on my hppa box running the 
2.6.18-parisc64-smp kernel:
cat: error while loading shared libraries: internal error: symidx out of 
range of fptr table

People on #parisc say that this is a glibc issue:
patofiero fjp, I have not looked at the current sources in debian glibc, 
but in general there *are* functions which are supposed to be atomic but 
are not. These failures can cause a symidx out of rang of fptr table 
error.
patofiero fjp, The failure is in glibc.
patofiero fjp, It's using non-atomic implementation of compare and swap. 
However, the problem is systemic of a kernel that doesn't have atomic 
helper functions.
fjp I'm running 2.6.18-4-parisc64-smp
patofiero fjp, smp is more likely to trigger the error.
patofiero fjp, You have the atomic helper routines present in your 
kernel.
patofiero fjp, The glibc you have just isn't using them.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: hppa (parisc64)

Kernel: Linux 2.6.18-4-parisc64-smp (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


pgpzwYHMTiQdQ.pgp
Description: PGP signature


tzdata 2007f-1 MIGRATED to testing

2007-05-15 Thread Debian testing watch
FYI: The status of the tzdata source package
in Debian's testing distribution has changed.

  Previous version: 2007e-3
  Current version:  2007f-1

-- 
This email is automatically generated; [EMAIL PROTECTED] is responsible.
See http://people.debian.org/~henning/trille/ for more information.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Administre su pymes - Maximice sus ganancias

2007-05-15 Thread pymesadmin7768
Administre su pymes - Maximice sus ganancias - Aprenda una correcta gestion 
de su negocio

Ingrese a nuestro sitio escribiendo en la barra de direcciones:

www.ciberia.ya.com/adminpymes/


























Visitante NĂºmero 7951














































-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]