On Mon, Sep 05, 2005 at 12:59:05AM +0200, Zoran Dzelajlija wrote:
debian/patches/902_glibc-2.3.5-pt_pax-1.dpatch
This adds some ELF-flags to elf.h.
debian/patches/903_glibc-2.3.5-dl_execstack_PaX-2.dpatch
This effectively removes any sanity check for executable stack.
Bastian
--
Spock:
Package: libc6-dev
Version: 2.3.2
Hi.
I've encountered a problem with libdl.so.
The dlsym(RTLD_NEXT, foo) is broken with runtime linked libraries.
Here are 2 little programs and 4 libraries to underline the faulty behavi=
our:
# the libraries:
for i in 1 2 3 4
do
cat lib$i.c EOF
#include
Package: libc6
Version: 2.3.2
uname -a: Linux indy 2.4.16 #1 Sun Dec 16 16:38:44 CET 2001 mips unknown
dpkg -s libc6 | grep ^Version: 2.2.5-11.8
After doing an apt-get upgrade, make no longer works:
indy:/home/njh# make
make: /lib/libc.so.6: version `GLIBC_2.3' not found (required by make)
Package: libc6
Version: 2.3.2.ds1-21
Severity: normal
The bug report refers to the packet libc6. When installing newer version
of libc6 the apt system tries to uninstall all kernels. See the
following example:
# apt-get install libc6
Reading Package Lists... Done
Building Dependency Tree... Done
GOTO Masanori [EMAIL PROTECTED] writes:
Zlatko, could you confirm what process actually has this mapping using
lsof?
Absolutely. Gabor is completely right. I'll just repeat what I
initially reported:
lsof says:
rc1119 root mem REG8,9 217016 228931 /var/db/nscd/passwd
Gabor Gombas [EMAIL PROTECTED] writes:
Well, if /bin/sh is bash, then it is not weird at all, it is the same
bash vs. NSS problem that came up several times in the past (last time
quite recently on debian-devel). Previously it only happened with NSS
modules that link to libraries under /usr,
GOTO Masanori [EMAIL PROTECTED] writes:
It's very weird behavior. Please disable nscd when your boot up time,
and then run /etc/init.d/nscd. You can see which processes have such
nscd file descriptor (fd), and you can clear process inheritance with
pstree easily. If nothing has nscd fd,
Package: libc6
Version: 2.3.5-6
Severity: normal
Tags: security
valgrind reports 13 instances of Conditional jump or move depends on
uninitialised value(s) using the new libc6 in testing, for a trivial
program which just calls exit(0). This is valgrind-2.4.0-3.
--
To UNSUBSCRIBE, email to
Processing commands for [EMAIL PROTECTED]:
tags 326832 - security
Bug#326832: libc6: valgrind reports use of uninitialized values
Tags were: security
Tags removed: security
thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
9 matches
Mail list logo