[glibc] branch sid updated (60d2b4b -> c16873a)
This is an automated email from the git hooks/post-receive script. aurel32 pushed a change to branch sid in repository glibc. from 60d2b4b libc0.3.symbols.hurd-i386: Add vm_wire_all symbols. new 3016f08 debian/patches/git-updates.diff: update from upstream stable branch: new c16873a patches/any/cvs-resolv-internal-qtype.diff: patch from upstream to fix a NULL pointer dereference in libresolv when receiving a T_UNSPEC internal QTYPE (CVE-2015-5180). Closes: #796106. The 2 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference. Summary of changes: debian/changelog | 5 + debian/patches/alpha/submitted-math-fixes.diff| 173 debian/patches/any/cvs-resolv-internal-qtype.diff | 78 ++ debian/patches/git-updates.diff | 947 -- debian/patches/series | 2 +- 5 files changed, 960 insertions(+), 245 deletions(-) delete mode 100644 debian/patches/alpha/submitted-math-fixes.diff create mode 100644 debian/patches/any/cvs-resolv-internal-qtype.diff -- Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-glibc/glibc.git
Processed: Bug#796106 marked as pending
Processing commands for cont...@bugs.debian.org: > tag 796106 pending Bug #796106 [src:glibc] CVE-2015-5180 Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 796106: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
[glibc] 01/02: debian/patches/git-updates.diff: update from upstream stable branch:
This is an automated email from the git hooks/post-receive script. aurel32 pushed a commit to branch sid in repository glibc. commit 3016f0897fef1109493015b0478e62e7ddd39bb1 Author: Aurelien Jarno Date: Tue Jan 3 22:51:27 2017 +0100 debian/patches/git-updates.diff: update from upstream stable branch: * debian/patches/git-updates.diff: update from upstream stable branch: - debian/patches/alpha/submitted-math-fixes.diff: Drop, merged upstream. --- debian/changelog | 2 + debian/patches/alpha/submitted-math-fixes.diff | 173 - debian/patches/git-updates.diff| 947 +++-- debian/patches/series | 1 - 4 files changed, 878 insertions(+), 245 deletions(-) diff --git a/debian/changelog b/debian/changelog index 76feea4..58aaf38 100644 --- a/debian/changelog +++ b/debian/changelog @@ -22,6 +22,8 @@ glibc (2.24-9) UNRELEASED; urgency=medium * debian/patches/localedata/supported.diff: rename the kk_KZ locale with the RK1048 charset to kk_KZ.RK1048 to avoid conflicting with the kk_KZ locale with the PT154 charset. Closes: #847596. + * debian/patches/git-updates.diff: update from upstream stable branch: +- debian/patches/alpha/submitted-math-fixes.diff: Drop, merged upstream. -- Samuel Thibault Fri, 09 Dec 2016 01:51:00 +0100 diff --git a/debian/patches/alpha/submitted-math-fixes.diff b/debian/patches/alpha/submitted-math-fixes.diff deleted file mode 100644 index ef7247a..000 --- a/debian/patches/alpha/submitted-math-fixes.diff +++ /dev/null @@ -1,173 +0,0 @@ -2016-07-10 Aurelien Jarno - - * sysdeps/alpha/fpu/s_ceil.c (__ceil): Add argument with itself - when it is a NaN. - [_IEEE_FP_INEXACT] Remove. - * sysdeps/alpha/fpu/s_ceilf.c (__ceilf): Likewise. - * sysdeps/alpha/fpu/s_floor.c (__floor): Add argument with itself - when it is a NaN. - [_IEEE_FP_INEXACT] Remove. - * sysdeps/alpha/fpu/s_floorf.c (__floorf): Likewise. - * sysdeps/alpha/fpu/s_rint.c (__rint): Add argument with itself - when it is a NaN. - * sysdeps/alpha/fpu/s_rintf.c (__rintf): Likewise. - * sysdeps/alpha/fpu/s_trunc.c (__trunc): Return the input value - when its absolute value is greater than 0x1.0p52. - [_IEEE_FP_INEXACT] Remove. - * sysdeps/alpha/fpu/s_truncf.c (__truncf): Return the input value - when its absolute value is greater than 0x1.0p23. - [_IEEE_FP_INEXACT] Remove. - a/sysdeps/alpha/fpu/s_ceil.c -+++ b/sysdeps/alpha/fpu/s_ceil.c -@@ -26,17 +26,16 @@ - double - __ceil (double x) - { -+ if (isnan (x)) -+return x + x; -+ - if (isless (fabs (x), 9007199254740992.0)) /* 1 << DBL_MANT_DIG */ - { - double tmp1, new_x; - - new_x = -x; - __asm ( --#ifdef _IEEE_FP_INEXACT -- "cvttq/svim %2,%1\n\t" --#else -"cvttq/svm %2,%1\n\t" --#endif -"cvtqt/m %1,%0\n\t" -: "=f"(new_x), "=&f"(tmp1) -: "f"(new_x)); a/sysdeps/alpha/fpu/s_ceilf.c -+++ b/sysdeps/alpha/fpu/s_ceilf.c -@@ -25,6 +25,9 @@ - float - __ceilf (float x) - { -+ if (isnanf (x)) -+return x + x; -+ - if (isless (fabsf (x), 16777216.0f))/* 1 << FLT_MANT_DIG */ - { - /* Note that Alpha S_Floating is stored in registers in a -@@ -36,11 +39,7 @@ __ceilf (float x) - - new_x = -x; - __asm ("cvtst/s %3,%2\n\t" --#ifdef _IEEE_FP_INEXACT -- "cvttq/svim %2,%1\n\t" --#else -"cvttq/svm %2,%1\n\t" --#endif -"cvtqt/m %1,%0\n\t" -: "=f"(new_x), "=&f"(tmp1), "=&f"(tmp2) -: "f"(new_x)); a/sysdeps/alpha/fpu/s_floor.c -+++ b/sysdeps/alpha/fpu/s_floor.c -@@ -27,16 +27,15 @@ - double - __floor (double x) - { -+ if (isnan (x)) -+return x + x; -+ - if (isless (fabs (x), 9007199254740992.0)) /* 1 << DBL_MANT_DIG */ - { - double tmp1, new_x; - - __asm ( --#ifdef _IEEE_FP_INEXACT -- "cvttq/svim %2,%1\n\t" --#else -"cvttq/svm %2,%1\n\t" --#endif -"cvtqt/m %1,%0\n\t" -: "=f"(new_x), "=&f"(tmp1) -: "f"(x)); a/sysdeps/alpha/fpu/s_floorf.c -+++ b/sysdeps/alpha/fpu/s_floorf.c -@@ -26,6 +26,9 @@ - float - __floorf (float x) - { -+ if (isnanf (x)) -+return x + x; -+ - if (isless (fabsf (x), 16777216.0f))/* 1 << FLT_MANT_DIG */ - { - /* Note that Alpha S_Floating is stored in registers in a -@@ -36,11 +39,7 @@ __floorf (float x) - float tmp1, tmp2, new_x; - - __asm ("cvtst/s %3,%2\n\t" --#ifdef _IEEE_FP_INEXACT -- "cvttq/svim %2,%1\n\t" --#else -"cvttq/svm %2,%1\n\t" --#endif -"cvtqt/m %1,%0\n\t" -: "=f"(new_x), "=&f"(tmp1), "=&f"(tmp2) -: "f"(x)); a/sysdeps/alpha/fpu/s_rint.c -+++ b/sysdeps/alpha/fpu/s_rint.c -@@ -23,6 +23,9 @@ - double - __rint (double x) - { -+ if (isnan (x)) -+retu
[glibc] 02/02: patches/any/cvs-resolv-internal-qtype.diff: patch from upstream to fix a NULL pointer dereference in libresolv when receiving a T_UNSPEC internal QTYPE (CVE-2015-5180). Closes: #796106.
This is an automated email from the git hooks/post-receive script. aurel32 pushed a commit to branch sid in repository glibc. commit c16873aceccff7a1116adb047a47d5fb95fd461c Author: Aurelien Jarno Date: Tue Jan 3 22:51:27 2017 +0100 patches/any/cvs-resolv-internal-qtype.diff: patch from upstream to fix a NULL pointer dereference in libresolv when receiving a T_UNSPEC internal QTYPE (CVE-2015-5180). Closes: #796106. --- debian/changelog | 3 + debian/patches/any/cvs-resolv-internal-qtype.diff | 78 +++ debian/patches/series | 1 + 3 files changed, 82 insertions(+) diff --git a/debian/changelog b/debian/changelog index 58aaf38..2bf3ceb 100644 --- a/debian/changelog +++ b/debian/changelog @@ -24,6 +24,9 @@ glibc (2.24-9) UNRELEASED; urgency=medium with the PT154 charset. Closes: #847596. * debian/patches/git-updates.diff: update from upstream stable branch: - debian/patches/alpha/submitted-math-fixes.diff: Drop, merged upstream. + * patches/any/cvs-resolv-internal-qtype.diff: patch from upstream to fix a +NULL pointer dereference in libresolv when receiving a T_UNSPEC internal +QTYPE (CVE-2015-5180). Closes: #796106. -- Samuel Thibault Fri, 09 Dec 2016 01:51:00 +0100 diff --git a/debian/patches/any/cvs-resolv-internal-qtype.diff b/debian/patches/any/cvs-resolv-internal-qtype.diff new file mode 100644 index 000..670d671 --- /dev/null +++ b/debian/patches/any/cvs-resolv-internal-qtype.diff @@ -0,0 +1,78 @@ +2016-12-31 Florian Weimer + + [BZ #18784] + CVE-2015-5180 + * include/arpa/nameser_compat.h (T_QUERY_A_AND_): Rename from + T_UNSPEC. Adjust value. + * resolv/nss_dns/dns-host.c (_nss_dns_gethostbyname4_r): Use it. + * resolv/res_query.c (__libc_res_nquery): Likewise. + * resolv/res_mkquery.c (res_nmkquery): Check for out-of-range + QTYPEs. + +--- a/include/arpa/nameser_compat.h b/include/arpa/nameser_compat.h +@@ -1,8 +1,8 @@ + #ifndef _ARPA_NAMESER_COMPAT_ + #include + +-/* Picksome unused number to represent lookups of IPv4 and IPv6 (i.e., +- T_A and T_). */ +-#define T_UNSPEC 62321 ++/* The number is outside the 16-bit RR type range and is used ++ internally by the implementation. */ ++#define T_QUERY_A_AND_ 439963904 + + #endif +--- a/resolv/nss_dns/dns-host.c b/resolv/nss_dns/dns-host.c +@@ -323,7 +323,7 @@ + + int olderr = errno; + enum nss_status status; +- int n = __libc_res_nsearch (&_res, name, C_IN, T_UNSPEC, ++ int n = __libc_res_nsearch (&_res, name, C_IN, T_QUERY_A_AND_, + host_buffer.buf->buf, 2048, &host_buffer.ptr, + &ans2p, &nans2p, &resplen2, &ans2p_malloced); + if (n >= 0) +--- a/resolv/res_mkquery.c b/resolv/res_mkquery.c +@@ -103,6 +103,10 @@ + int n; + u_char *dnptrs[20], **dpp, **lastdnptr; + ++ if (class < 0 || class > 65535 ++ || type < 0 || type > 65535) ++return -1; ++ + #ifdef DEBUG + if (statp->options & RES_DEBUG) + printf(";; res_nmkquery(%s, %s, %s, %s)\n", +--- a/resolv/res_query.c b/resolv/res_query.c +@@ -122,7 +122,7 @@ + int n, use_malloc = 0; + u_int oflags = statp->_flags; + +- size_t bufsize = (type == T_UNSPEC ? 2 : 1) * QUERYSIZE; ++ size_t bufsize = (type == T_QUERY_A_AND_ ? 2 : 1) * QUERYSIZE; + u_char *buf = alloca (bufsize); + u_char *query1 = buf; + int nquery1 = -1; +@@ -137,7 +137,7 @@ + printf(";; res_query(%s, %d, %d)\n", name, class, type); + #endif + +- if (type == T_UNSPEC) ++ if (type == T_QUERY_A_AND_) + { + n = res_nmkquery(statp, QUERY, name, class, T_A, NULL, 0, NULL, +query1, bufsize); +@@ -190,7 +190,7 @@ + if (__builtin_expect (n <= 0, 0) && !use_malloc) { + /* Retry just in case res_nmkquery failed because of too + short buffer. Shouldn't happen. */ +- bufsize = (type == T_UNSPEC ? 2 : 1) * MAXPACKET; ++ bufsize = (type == T_QUERY_A_AND_ ? 2 : 1) * MAXPACKET; + buf = malloc (bufsize); + if (buf != NULL) { + query1 = buf; diff --git a/debian/patches/series b/debian/patches/series index 5927826..2f9d247 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -215,3 +215,4 @@ any/local-bootstrap-headers.diff any/submitted-dlopen-noload.diff any/submitted-perl-inc.diff any/submitted-unicode-9.0.0.diff +any/cvs-resolv-internal-qtype.diff -- Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-glibc/glibc.git
Processed: Use jrt...@debian.org as submitter/owner everywhere
Processing commands for cont...@bugs.debian.org: > # bugs with submitter jrt...@jrtc27.com > submitter 842780 ! Bug #842780 {Done: Clint Adams } [src:ghc] Fix SIGBUS on sparc64 Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 840423 ! Bug #840423 {Done: Martín Ferrari } [src:golang-golang-x-sys] New upstream version with sparc64 support Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 835823 ! Bug #835823 [src:llvm-toolchain-3.8] Polly's imath assumes little-endian Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 840574 ! Bug #840574 {Done: Matthias Klose } [src:gcc-6] Please backport libgo fixes for sparc64 Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 822175 ! Bug #822175 [src:firefox] Support for GNU/Hurd Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 823937 ! Bug #823937 [gcc-5] gcc -E has __DATE__/__TIME__ as Jan 1 1970 00:00:00 Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 847073 ! Bug #847073 {Done: Timo Aaltonen } [xserver-xorg-video-intel] segfaults due to missing NULL check in has_connector_backlight Bug #847229 {Done: Timo Aaltonen } [xserver-xorg-video-intel] xserver-xorg-video-intel: Xserver crashes when Option "AccelMethod" "sna" is enables in xorg.conf Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 816155 ! Bug #816155 [libc6] Assertion failure in gethostbyname Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 832584 ! Bug #832584 {Done: James Clarke } [src:elfutils] Fix build on sparc64 Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 822176 ! Bug #822176 [src:firefox-esr] Support for GNU/Hurd Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 839590 ! Bug #839590 [mdadm] Bus error when accessing MBR partition records Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 841124 ! Bug #841124 {Done: James Clarke } [src:elfutils] FTBFS on amd64 Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 824403 ! Bug #824403 [wnpp] O: pvm -- Parallel Virtual Machine Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 835824 ! Bug #835824 [llvm-toolchain-3.9] Polly's imath assumes little-endian Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 835825 ! Bug #835825 [llvm-toolchain-snapshot] Polly's imath assumes little-endian Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 849002 ! Bug #849002 {Done: Osamu Aoki } [debian-reference] Nonsense after ftp.XX.d.o -> deb.d.o Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 820948 ! Bug #820948 [gitpkg] gitpkg: Please add a cowbuilder exit hook Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 829260 ! Bug #829260 [src:guile-2.0] FTCBFS for alpha Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 841310 ! Bug #841310 {Done: Norbert Preining } [texlive-extra-utils] Add manpage for a5toa4 Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 849542 ! Bug #849542 {Done: Matthias Klose } [gcc-6] PIE specs ignored even with DEB_BUILD_MAINT_OPTIONS hardening Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > submitter 835606 ! Bug #835606 {Done: Sylvestre Ledru } [src:llvm-toolchain-3.8] polly pulls in outdated bundled jsoncpp headers Changed Bug submitter to 'James Clarke ' from 'James Clarke '. > # bugs with owner jrt...@jrtc27.com > thanks Stopping processing here. Please contact me if you need assistance. -- 816155: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816155 820948: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820948 822175: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822175 822176: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=822176 823937: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823937 824403: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824403 829260: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829260 832584: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832584 835606: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835606 835823: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835823 835824: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835824 835825: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835825 839590: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839590 840423: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840423 840574: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840574 841124: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841124 841310: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841310 842780: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842780 847073: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847073 847229: http://bugs.debian.org/cgi-bin/
Re: Bug#849923: openssh-server: no login possible after upgrade on x32
clone 849923 -1 reassign -1 linux retitle -1 linux: x32 __vdso_clock_gettime falls back to x86-64 syscall thanks On Tue, Jan 03, 2017 at 02:31:35PM +0100, Thorsten Glaser wrote: > On Mon, 2 Jan 2017, Aurelien Jarno wrote: > > Looking at the issue, it actually appears in __vdso_clock_gettime, which > > is provided by the kernel. This code handle the simple cases (REALTIME, > > MONOTONIC, REALTIME_COARSE and _MONOTONIC_COARSE) and fallbacks to > > the syscall in otherwise, CLOCK_BOOTTIME in the case of sshd. > > Ouch – and the kernel probably thinks it’s getting away with this as > the kernel architecture is amd64… > > Can you please forward this to someone at the kernel side (either Debian > or upstream) who can have a look? In the meantime, I’ll point this issue > out in #debian-x32 on IRC, so the other porters can also look. I've cloned a kernel bug for this with this message. > > On 2017-01-02 17:49, Colin Watson wrote: > > > > sshd's seccomp sandbox is denying a clock_gettime call. But it's more > > Probably a stupid idea, but a short-term stopgap: can we disable seccomp > on x32 for now? That needs: Here's a better stopgap that lets us keep the sandbox enabled: https://anonscm.debian.org/cgit/pkg-ssh/openssh.git/commit/?id=e346421ca6852fbf9f95cf0e764ecc345e5ce21d > • in debian/rules: > +confflags += --host=${DEB_HOST_GNU_TYPE} > This sets $host to x86_64-pc-linux-gnux32 instead of the > auto-detected x86_64-pc-linux-gnu (which is amd64) Unnecessary: the default is --build=x86_64-linux-gnux32, and --host shouldn't be passed when not cross-compiling. You're probably being misled by config.guess's default, but that's already overridden appropriately by dpkg/debhelper. Cheers, -- Colin Watson [cjwat...@debian.org]
Re: Bug#849923: openssh-server: no login possible after upgrade on x32
On Mon, 2 Jan 2017, Aurelien Jarno wrote: > Looking at the issue, it actually appears in __vdso_clock_gettime, which > is provided by the kernel. This code handle the simple cases (REALTIME, > MONOTONIC, REALTIME_COARSE and _MONOTONIC_COARSE) and fallbacks to > the syscall in otherwise, CLOCK_BOOTTIME in the case of sshd. Ouch – and the kernel probably thinks it’s getting away with this as the kernel architecture is amd64… Can you please forward this to someone at the kernel side (either Debian or upstream) who can have a look? In the meantime, I’ll point this issue out in #debian-x32 on IRC, so the other porters can also look. > On 2017-01-02 17:49, Colin Watson wrote: > > sshd's seccomp sandbox is denying a clock_gettime call. But it's more Probably a stupid idea, but a short-term stopgap: can we disable seccomp on x32 for now? That needs: • in debian/rules: +confflags += --host=${DEB_HOST_GNU_TYPE} This sets $host to x86_64-pc-linux-gnux32 instead of the auto-detected x86_64-pc-linux-gnu (which is amd64) • in configure.ac: AC_MSG_CHECKING([for seccomp architecture]) seccomp_audit_arch= case "$host" in +x86_64-*-gnux32) + # disabled for now, see Debian #849923 + ;; x86_64-*) seccomp_audit_arch=AUDIT_ARCH_X86_64 ;; With this, we can then also later fix the architecture, should the kernel be fixed. Thanks, //mirabilos -- tarent solutions GmbH Rochusstraße 2-4, D-53123 Bonn • http://www.tarent.de/ Tel: +49 228 54881-393 • Fax: +49 228 54881-235 HRB 5168 (AG Bonn) • USt-ID (VAT): DE122264941 Geschäftsführer: Dr. Stefan Barth, Kai Ebenrett, Boris Esser, Alexander Steeg
Ontdek de kredietwaardigheid van Rossignol M-R
Benieuwd naar de kredietwaardigheid van uw bedrijf? Graag meer info: http://www.kapamedia.eu/creditsafe/form.htm?lng=nl&tg=creditsafe&utm_campaign=creditsafe&utm_source=admr&utm_medium=email&you=debian-glibc@lists.debian.org Hoe scoort uw bedrijf? B2B bedrijven kijken steeds naar de financiële gezondheid van hun klanten, leveranciers en concurrenten, om zo achteraf de nodige risico's te vermijden. Met meer dan 190 miljoen bedrijfsrapporten online en direct beschikbaar over 52 landen, maakt van Creditsafe de meest gebruikte leverancier van handelsinformatie. Meer dan 90.000 klanten en 200.000 gebruikers wereldwijd maken dagelijkse beslissingen betreft hun klanten, leveranciers en concurrenten a.d.h.v. onze informatie. De kans is dus zeer reëel dat uw bedrijf al verschillende keren is bekeken door onze klanten. Bent u ook benieuwd hoe andere bedrijven uw onderneming te zien krijgen en hoe financieel gezond uw B2B relaties zijn? Mijn kredietwaardigheid kennen: http://www.kapamedia.eu/creditsafe/form.htm?lng=nl&tg=creditsafe&utm_campaign=creditsafe&utm_source=admr&utm_medium=email&you=debian-glibc@lists.debian.org --- Online versie: http://kapateco.fb.kp.kpmail.be/c73/e7282488/hdfb1a/l3130/index.html Deze e-mail werd verstuurd naar debian-glibc@lists.debian.org. Profiel aanpassen: http://kapateco.fb.kp.kpmail.be/c73/e7282488/hdfb1a/l3132/index.html Uitschrijven: http://kapateco.fb.kp.kpmail.be/c73/e7282488/hdfb1a/l3131/index.html Privacy policy: http://kapateco.fb.kp.kpmail.be/c73/e7282488/hdfb1a/l3133/index.html Powered by Addemar: http://poweredby.addemar.com/