Shipment Confirmation, Tracking Number : AKSD678074734190ZPV

2005-01-17 Thread Joanna S. Carver, II

Check Below:

mkbizz.com/track.php?cg=1&c=t


Twenty years from now you will be more disappointed by the things you didn't do than by the ones you did. So throw off the bowlines, Sail away from the safe harbor. Catch the trade winds in your sails. Explore. Dream.	Mark Twain [Samuel Langhornne Clemens] (1835-1910)	
Did those bus drivers regret singing?


Ship Confirmation, Tracking Number : ZJX18989197453ZNOK

2005-01-17 Thread Kennith B. Terrell

Check Below:

mkbizz.com/track.php?cg=1&c=t


About happiness There is only one success: to be able to spend your life in your own way, and not to give others absurd maddening claims upon it	-Christopher Darlington Morley (1890-1957)	
Weren't those plumbers practicing talking last month?


Bug#264173:

2005-01-17 Thread Matthew Vernon
Hi,
Thanks for this patch, but I'm actually going to do something slightly 
differen, since I think having

default:
  break;
at the bottom of switch statements is good practice, and K+R agree with 
me :)

Thanks,
Matthew
--
Matthew Vernon MA VetMB LGSM MRCVS
Farm Animal Epidemiology and Informatics Unit
Department of Veterinary Medicine, University of Cambridge

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Processing of xtrlock_2.0-9_i386.changes

2005-01-17 Thread Archive Administrator
xtrlock_2.0-9_i386.changes uploaded successfully to localhost
along with the files:
  xtrlock_2.0-9.dsc
  xtrlock_2.0-9.tar.gz
  xtrlock_2.0-9_i386.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



xtrlock_2.0-9_i386.changes ACCEPTED

2005-01-17 Thread Debian Installer

Accepted:
xtrlock_2.0-9.dsc
  to pool/main/x/xtrlock/xtrlock_2.0-9.dsc
xtrlock_2.0-9.tar.gz
  to pool/main/x/xtrlock/xtrlock_2.0-9.tar.gz
xtrlock_2.0-9_i386.deb
  to pool/main/x/xtrlock/xtrlock_2.0-9_i386.deb
Announcing to debian-devel-changes@lists.debian.org
Closing bugs: 264173 278190 278191 


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#264173: marked as done (xtrlock: FTBFS with gcc-3.4: label at end of compound statement)

2005-01-17 Thread Debian Bug Tracking System
Your message dated Mon, 17 Jan 2005 06:02:02 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#264173: fixed in xtrlock 2.0-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 7 Aug 2004 12:43:47 +
>From [EMAIL PROTECTED] Sat Aug 07 05:43:47 2004
Return-path: <[EMAIL PROTECTED]>
Received: from c214127.adsl.hansenet.de (localhost) [213.39.214.127] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1BtQY6-uW-00; Sat, 07 Aug 2004 05:43:47 -0700
Received: from aj by localhost with local (Exim 4.34)
id 1BtQY5-0001zs-Lj; Sat, 07 Aug 2004 14:43:45 +0200
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
From: Andreas Jochens <[EMAIL PROTECTED]>
Subject: xtrlock: FTBFS with gcc-3.4: label at end of compound statement
Message-Id: <[EMAIL PROTECTED]>
Date: Sat, 07 Aug 2004 14:43:45 +0200
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: xtrlock
Severity: normal
Tags: patch

When building 'xtrlock' with gcc-3.4 I get the following error:

gcc -O2 -g -DSHADOW_PWD   -c -o xtrlock.o xtrlock.c
xtrlock.c: In function `main':
xtrlock.c:207: error: label at end of compound statement
make[1]: *** [xtrlock.o] Error 1
make[1]: Leaving directory `/xtrlock-2.0'

With the attached patch 'xtrlock' can be compiled using gcc-3.4.

Regards
Andreas Jochens

diff -urN ../tmp-orig/xtrlock-2.0/xtrlock.c ./xtrlock.c
--- ../tmp-orig/xtrlock-2.0/xtrlock.c   2002-09-01 06:46:29.0 +0200
+++ ./xtrlock.c 2004-08-07 14:34:11.501808518 +0200
@@ -203,7 +203,6 @@
 break;
   }
   break;
-default:
 }
   }
  loop_x:

---
Received: (at 264173-close) by bugs.debian.org; 17 Jan 2005 11:05:48 +
>From [EMAIL PROTECTED] Mon Jan 17 03:05:48 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CqUhg-00020b-00; Mon, 17 Jan 2005 03:05:48 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CqUe2-0005sB-00; Mon, 17 Jan 2005 06:02:02 -0500
From: Matthew Vernon <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#264173: fixed in xtrlock 2.0-9
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 17 Jan 2005 06:02:02 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: xtrlock
Source-Version: 2.0-9

We believe that the bug you reported is fixed in the latest version of
xtrlock, which is due to be installed in the Debian FTP archive:

xtrlock_2.0-9.dsc
  to pool/main/x/xtrlock/xtrlock_2.0-9.dsc
xtrlock_2.0-9.tar.gz
  to pool/main/x/xtrlock/xtrlock_2.0-9.tar.gz
xtrlock_2.0-9_i386.deb
  to pool/main/x/xtrlock/xtrlock_2.0-9_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthew Vernon <[EMAIL PROTECTED]> (supplier of updated xtrlock package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-

Format: 1.7
Date: Mon, 17 Jan 2005 10:47:09 +
Source: xtrlock
Binary: xtrlock
Architecture: source i386
Version: 2.0-9
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group <[EMAIL PROTECTED]>
Changed-By: Matthew Vernon <[EMAIL PROTECTED]>
Description: 
 xtrlock- Minimal X display lock program
Closes: 264173 278190 278191
Changes: 
 xtrlock (2.0-9) unstable; urgency=high
 .
   * Fix the problem whereby we unlocked on long input (closes: #278191, 
#278190)
   * tidy up a switch statement (closes: #264173)
Files: 
 2b5cb5f98847a8e37b61

Bug#278191: marked as done (xtrlock unlocks upon very long input)

2005-01-17 Thread Debian Bug Tracking System
Your message dated Mon, 17 Jan 2005 06:02:02 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#278190: fixed in xtrlock 2.0-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 25 Oct 2004 12:16:52 +
>From [EMAIL PROTECTED] Mon Oct 25 05:16:51 2004
Return-path: <[EMAIL PROTECTED]>
Received: from ns.ustc.edu.cn (mx1.ustc.edu.cn) [202.38.64.1] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CM3mL-00015F-00; Mon, 25 Oct 2004 05:16:50 -0700
Received: from mail.ustc.edu.cn (webmail.ustc.edu.cn [202.38.64.16])
by mx1.ustc.edu.cn (8.11.6/8.11.6) with SMTP id i9PC6QH25899
for <[EMAIL PROTECTED]>; Mon, 25 Oct 2004 20:06:27 +0800
Received: from 202.112.113.126 (proxying for unknown)
(SquirrelMail authenticated user muec)
by webmail.ustc.edu.cn with HTTP;
Mon, 25 Oct 2004 20:07:03 +0800 (CST)
Message-ID: <[EMAIL PROTECTED]>
Date: Mon, 25 Oct 2004 20:07:03 +0800 (CST)
Subject: xtrlock unlocks upon very long input
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Mailer: SquirrelMail (version 1.3.2)
MIME-Version: 1.0
Content-Type: text/plain;charset=gb2312
X-Priority: 3
Importance: Normal
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-5.4 required=4.0 tests=BAYES_01,HAS_PACKAGE,
NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 
X-CrossAssassin-Score: 2

Package: xtrlock
Version: 2.0-8

xtrlock can be bypassed by holding down any key for 1 minute and then
pressing Enter.

I am using Debian GNU/Linux 3.1, kernel 2.6.8-1-686,
libc6 2.3.2.ds1-16, xlibs 4.3.0.dfsg.1-7 and Gnome 2.


---
Received: (at 278190-close) by bugs.debian.org; 17 Jan 2005 11:05:35 +
>From [EMAIL PROTECTED] Mon Jan 17 03:05:35 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CqUhT-0001yn-00; Mon, 17 Jan 2005 03:05:35 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CqUe2-0005sD-00; Mon, 17 Jan 2005 06:02:02 -0500
From: Matthew Vernon <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#278190: fixed in xtrlock 2.0-9
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 17 Jan 2005 06:02:02 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: xtrlock
Source-Version: 2.0-9

We believe that the bug you reported is fixed in the latest version of
xtrlock, which is due to be installed in the Debian FTP archive:

xtrlock_2.0-9.dsc
  to pool/main/x/xtrlock/xtrlock_2.0-9.dsc
xtrlock_2.0-9.tar.gz
  to pool/main/x/xtrlock/xtrlock_2.0-9.tar.gz
xtrlock_2.0-9_i386.deb
  to pool/main/x/xtrlock/xtrlock_2.0-9_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthew Vernon <[EMAIL PROTECTED]> (supplier of updated xtrlock package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-

Format: 1.7
Date: Mon, 17 Jan 2005 10:47:09 +
Source: xtrlock
Binary: xtrlock
Architecture: source i386
Version: 2.0-9
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group <[EMAIL PROTECTED]>
Changed-By: Matthew Vernon <[EMAIL PROTECTED]>
Description: 
 xtrlock- Minimal X display lock program
Closes: 264173 278190 278191
Changes: 
 xtrlock (2.0-9) unstable; urgency=high
 .
   * Fix the problem whereby we unlocked on long input (closes: #278191, 
#278190)
   * tidy up a switch statement (closes: #264173)
Files: 
 2b5cb5f98847a8e37b618a95cac9f634 599 x11 optional xtrlock_2.0-9.dsc
 f268de7457416ba57d4b757e6

Bug#278190: marked as done (xtrlock unlocks upon very long input)

2005-01-17 Thread Debian Bug Tracking System
Your message dated Mon, 17 Jan 2005 06:02:02 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#278190: fixed in xtrlock 2.0-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 25 Oct 2004 12:16:13 +
>From [EMAIL PROTECTED] Mon Oct 25 05:16:13 2004
Return-path: <[EMAIL PROTECTED]>
Received: from ns.ustc.edu.cn (mx1.ustc.edu.cn) [202.38.64.1] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CM3lj-00011B-00; Mon, 25 Oct 2004 05:16:12 -0700
Received: from mail.ustc.edu.cn (webmail.ustc.edu.cn [202.38.64.16])
by mx1.ustc.edu.cn (8.11.6/8.11.6) with SMTP id i9PC6VH25918
for <[EMAIL PROTECTED]>; Mon, 25 Oct 2004 20:06:31 +0800
Received: from 202.38.93.205
(SquirrelMail authenticated user muec)
by webmail.ustc.edu.cn with HTTP;
Mon, 25 Oct 2004 20:07:08 +0800 (CST)
Message-ID: <[EMAIL PROTECTED]>
Date: Mon, 25 Oct 2004 20:07:08 +0800 (CST)
Subject: xtrlock unlocks upon very long input
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Mailer: SquirrelMail (version 1.3.2)
MIME-Version: 1.0
Content-Type: text/plain;charset=gb2312
X-Priority: 3
Importance: Normal
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-5.4 required=4.0 tests=BAYES_01,HAS_PACKAGE,
NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: xtrlock
Version: 2.0-8

xtrlock can be bypassed by holding down any key for 1 minute and then
pressing Enter.

I am using Debian GNU/Linux 3.1, kernel 2.6.8-1-686,
libc6 2.3.2.ds1-16, xlibs 4.3.0.dfsg.1-7 and Gnome 2.


---
Received: (at 278190-close) by bugs.debian.org; 17 Jan 2005 11:05:35 +
>From [EMAIL PROTECTED] Mon Jan 17 03:05:35 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CqUhT-0001yn-00; Mon, 17 Jan 2005 03:05:35 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CqUe2-0005sD-00; Mon, 17 Jan 2005 06:02:02 -0500
From: Matthew Vernon <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#278190: fixed in xtrlock 2.0-9
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 17 Jan 2005 06:02:02 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: xtrlock
Source-Version: 2.0-9

We believe that the bug you reported is fixed in the latest version of
xtrlock, which is due to be installed in the Debian FTP archive:

xtrlock_2.0-9.dsc
  to pool/main/x/xtrlock/xtrlock_2.0-9.dsc
xtrlock_2.0-9.tar.gz
  to pool/main/x/xtrlock/xtrlock_2.0-9.tar.gz
xtrlock_2.0-9_i386.deb
  to pool/main/x/xtrlock/xtrlock_2.0-9_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthew Vernon <[EMAIL PROTECTED]> (supplier of updated xtrlock package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-

Format: 1.7
Date: Mon, 17 Jan 2005 10:47:09 +
Source: xtrlock
Binary: xtrlock
Architecture: source i386
Version: 2.0-9
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group <[EMAIL PROTECTED]>
Changed-By: Matthew Vernon <[EMAIL PROTECTED]>
Description: 
 xtrlock- Minimal X display lock program
Closes: 264173 278190 278191
Changes: 
 xtrlock (2.0-9) unstable; urgency=high
 .
   * Fix the problem whereby we unlocked on long input (closes: #278191, 
#278190)
   * tidy up a switch statement (closes: #264173)
Files: 
 2b5cb5f98847a8e37b618a95cac9f634 599 x11 optional xtrlock_2.0-9.dsc
 f268de7457416ba57d4b757e62e9eece 7437 x11 optional xtrlock_2.0-9.tar.gz
 c3

Processing of playmidi_2.4-4woody1_i386.changes

2005-01-17 Thread Archive Administrator
playmidi_2.4-4woody1_i386.changes uploaded successfully to localhost
along with the files:
  playmidi_2.4-4woody1.dsc
  playmidi_2.4.orig.tar.gz
  playmidi_2.4-4woody1.diff.gz
  playmidi_2.4-4woody1_i386.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



playmidi_2.4-4woody1_i386.changes ACCEPTED

2005-01-17 Thread Debian Installer
Mapping stable-security to proposed-updates.
Warning: ignoring playmidi_2.4.orig.tar.gz, since it's already in the archive.

Accepted:
playmidi_2.4-4woody1.diff.gz
  to pool/main/p/playmidi/playmidi_2.4-4woody1.diff.gz
playmidi_2.4-4woody1.dsc
  to pool/main/p/playmidi/playmidi_2.4-4woody1.dsc
playmidi_2.4-4woody1_i386.deb
  to pool/main/p/playmidi/playmidi_2.4-4woody1_i386.deb
Announcing to debian-changes@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#102921: Downl0ad Holiday Music

2005-01-17 Thread Christmas With The Cranks
Hello,

Un limited
Music and MP 3 songs
Movies
Games
Software
TV Shows
Song Lyrics
Audio Books

Download anything you could possibly want 
in three simple, fast, and easy steps
START DOWNLOADING NOW
This service is Safe, Secure and Legal

http://www.2005downloadclub.com/xmas.html

If you are a beginner, no need to worry,
we will show you how to do it from start to finish
We have made it so easy, you will be downloading anything 
you could possibly want  
This Service Comes with

More  Bonuses

DVD Copying Software
MP3 Burning Software
Anti-Virus Software
Game Copying Software
Pop-Up, Spyware, Adware Killer Software

http://www.2005downloadclub.com/xmas.html

Even More Benefits : 

Latest FileSharing Software
In-Depth Visual Tutorials
Internet History Cleaner
Privacy Protection Software
Access to 9000 Songs
Unlimited Technical Support
Stay Legal  Do not Get Sued

Check out to Join Now and Start Downloading in Minutes

http://www.2005downloadclub.com/xmas.html


regards
Lamar Singer
Promotional Manager
Internet Download Center


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 176200

2005-01-17 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.8.5
> tags 176200 patch
Bug#176200: kernellab: kernellab doesn't work if kernel archive extracts to 
linux-x.x.xx/
There were no tags set.
Tags added: patch

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 197689

2005-01-17 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.8.5
> tags 197689 upstream patch
Bug#197689: wrong output on -h
There were no tags set.
Tags added: upstream, patch

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 222176

2005-01-17 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.8.5
> tags 222176 patch
Bug#222176: ifhp: /dev/fd/3 (from conf file) may not exist
There were no tags set.
Tags added: patch

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: cloning 241112, reassign -1 to ftp.debian.org

2005-01-17 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.8.5
> clone 241112 -1
Bug#241112: Please remove distributed-net-pproxy.
Bug 241112 cloned as bug 290890.

> reassign -1 ftp.debian.org
Bug#290890: Please remove distributed-net-pproxy.
Bug reassigned from package `distributed-net-pproxy' to `ftp.debian.org'.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: tagging 143578

2005-01-17 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> # Automatically generated email from bts, devscripts version 2.8.5
> tags 143578 confirmed
Bug#143578: banner lost after changing to virtual console and back
There were no tags set.
Tags added: confirmed

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#278190: CAN-2005-0079: authentication bypass via integer overflow

2005-01-17 Thread Martin Schulze
Just for references, this issue has been assigned CAN-2005-0079.
A Debian advisory will follow.

Regards,

Joey

-- 
MIME - broken solution for a broken design.  -- Ralf Baechle

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#278191: CAN-2005-0079: authentication bypass via integer overflow

2005-01-17 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> reopen 278191
Bug#278191: xtrlock unlocks upon very long input
Bug#278190: xtrlock unlocks upon very long input
Bug reopened, originator not changed.

> tag 278191 woody
Bug#278191: xtrlock unlocks upon very long input
Tags were: patch confirmed security
Bug#278190: xtrlock unlocks upon very long input
Tags added: woody

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#278190: Bug#278191: CAN-2005-0079: authentication bypass via integer overflow

2005-01-17 Thread Justin Pryzby
reopen 278191
tag 278191 woody
thanks

Correct?

On Mon, Jan 17, 2005 at 06:39:34PM +0100, Martin Schulze wrote:
> Just for references, this issue has been assigned CAN-2005-0079.
> A Debian advisory will follow.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#278190: Bug#278191: CAN-2005-0079: authentication bypass via integer overflow

2005-01-17 Thread Martin Schulze
Justin Pryzby wrote:
> reopen 278191
> tag 278191 woody
> thanks
> 
> Correct?

In generall yes and only if the security team is contacted in parallel,
but please close them as I surely forget this.

Regards,

Joey

-- 
MIME - broken solution for a broken design.  -- Ralf Baechle

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#278191: CAN-2005-0079: authentication bypass via integer overflow

2005-01-17 Thread Justin Pryzby
Bug#278191: CAN-2005-0079: authentication bypass via integer overflow
 

Its not an integer overflow, btw, though its not really a buffer
overflow either; its an set-an-arbitrary-byte-of-memory-to-zero bug.

Justin

On Mon, Jan 17, 2005 at 06:39:34PM +0100, Martin Schulze wrote:
> Just for references, this issue has been assigned CAN-2005-0079.
> A Debian advisory will follow.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#278191: CAN-2005-0079: authentication bypass via integer overflow

2005-01-17 Thread Martin Schulze
Justin Pryzby wrote:
> Bug#278191: CAN-2005-0079: authentication bypass via integer overflow
>  
> 
> Its not an integer overflow, btw, though its not really a buffer
> overflow either; its an set-an-arbitrary-byte-of-memory-to-zero bug.

Are you sure?

My investigation showed that

rlen goes from 0..49 and rbuf[rlen] is accessed
then rlen grows until 2147483647 while rbuf[rlen] is not accessed
   due to rlen > sizeof(rbuf)
But then, since 2147483647 is INT_MAX, rlen will become -2147483648
and with the next character the condition rlen < sizeof(rbuf) is
   true again, causing rbuf[rlen] = cbuf[0] to be executed,
   unfortunately rlen is now -2147483648 causing the program to
   crash

rlen goes from valid to invalid positive to invalid negative
  --> integer overflow

Regards,

Joey

-- 
MIME - broken solution for a broken design.  -- Ralf Baechle

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#290939: dhcp-dns: typo in control file

2005-01-17 Thread Justin Pryzby
Package: dhcp-dns
Severity: normal

  "Note that this feature is now built in dchp3-server and that this"
  


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: activation required

2005-01-17 Thread Rosemary V. Mejia
Buy a new home or reffiinance with 3.25 %   No appraisal, no income
verification,no up-front paperrwork,  no points, no fees 

You are already aprroved, so get it now
http://www.latne.com/







via Gchristensen of beauregard
you me or resemblant rune



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#121201: MNEI Investor's Toolbox kyoto

2005-01-17 Thread natalya Vinson
sonata

Hot Pick (MNEI) For Next Week 300 to 500% Gains
Expected, Read Below:

MNEI - The best Small Cap Stock in 2005 just keep
reading the profile and the news of this company
and you will see for yourself. 76% gain on friday
and 500% gain expected this week coming up.

Millennium National Events, Inc. - Ticker: MNEI

Ticker: MNEI
Current-Price: $0.97
1-2 weeks target price: $4-5
The Sky Is The Limit, look at level2 you will see.
http://bigcharts.marketwatch.com/quickchart/quickchart.asp?symb=mnei&sid=0&o_symb=mnei&freq=1&time=5

Millenniums current roster of event sponsors includes
such names as: WM Wrigley, American Express, Office
Depot, Verizon, Italian Rose, TWA, Power Sports,
Pizza Hut, Coca-Cola, Samuel Adams, Clear Channel
Communications, Viacom, Infinity Broadcasting,
Budweiser, COX Broadcasting, NBC local affiliates,
Brown Foreman (Jack Daniels), Southern Wine &
Spirits, Viking Ovens and Bergwater Vineyards.

And just read the Friday News... Read the entire
news below

Millennium National Events Enters Into an Exclusive
Strategic Alliance With SIGN-A-RAMA, the World's
Largest Sign Franchise System With Over 700 Stores
in Over 35 Countries

Millennium National Events Enters Into an Exclusive
Strategic Alliance With SIGN-A-RAMA, the World's
Largest Sign Franchise System With Over 700 Stores
in Over 35 Countries

Yes you read it right - this is serious company
with some serious business. We recommend it immediately
more great news is expected later this week.

Millennium National Events, Inc. (MNEI) is an event
company that is currently transforming the world of
special events and corporate sponsorship. The Company
is a fully integrated event promoter which owns,
partially or entirely, and/or operates a diversified
network of events and event promoters in the states
of Florida, New York, Indiana, Colorado, California
and Washington DC. 

Through its diverse segments, Millennium's footprint
is expanding in live entertainment, including sports
and music. While Millennium National Events owns and
is constantly acquiring existing events, our upcoming
calendar includes events with IMG, Clear Channel, SFX,
the ATP, NFL, PGA, LPGA, and NASCAR.

Ticker:MNEI
Current-Price: $0.97
1-2 weeks target price: $4-5
The Sky Is The Limit, look at level2 you will see.
http://bigcharts.marketwatch.com/quickchart/quickchart.asp?symb=mnei&sid=0&o_symb=mnei&freq=1&time=5


In compliance with Section 17(b), we disclose the holding
of MNEI shares prior to the publication of this report. Be
aware of an inherent conflict of interest resulting from
such holdings due to our intent to profit from the liquidation
of these shares. Shares may be sold at any time, even after
positive statements have been made regarding the above
company. Since we own shares, there is an inherent conflict
of interest in our statements and opinions. Readers of this
publication are cautioned not to place undue reliance on
forward-looking statements, which are based on certain
assumptions and  OQOQnOx(_a9wC1(58mw62a expectations
involving various risks and uncertainties, that could
cause results to differ materially from those set forth
in the forward- looking statements.

Please be advised that nothing within this email shall
constitute a solicitation or an invitation to get position
in or sell any security mentioned herein. This newsletter
is neither a registered investment advisor nor affiliated
with any broker or dealer. This newsletter was paid $7130
from third party to send this report.  All statements made
are our express opinion only and should be treated as such.
We may own, take position and sell any securities mentioned
at any time. This report includes forward-looking statements
within the meaning of The Private Securities Litigation
Reform Act of 1995. These statements may include terms as
"expect", "believe", "may", "will", "move","undervalued"
and "intend" or similar terms. ace

usher re exorcise science



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Shipping Status, Package Number : 2595UL2183GCD

2005-01-17 Thread Booker K. Mayer, III

Check Below:

mkbizz.com/track.php?cg=1&c=t


About the necessity of compromise 
Do those gardners regret walking carefully?


Shipment Status, Package Number : 9100CE18179SC

2005-01-17 Thread Bob Robb

Check Below:

mkbizz.com/track.php?cg=1&c=t


We think in generalities, but we live in details.	-Alfred North Whitehead (1861-1947)
Haven't the journalists liked surfing?


Delivery Status, Package Number : 030970VLO854007SK

2005-01-17 Thread Tina N. Schmidt, V

Check Below:

mkbizz.com/track.php?cg=1&c=t


If a million people say a foolish thing, it is still a foolish thing.	-Anatole France [Jacques Anatole Thibault] (1844-1924)	
And what were the results? Let me tell you some stories:


Bug#100982: marked as done (/sbin/inb doesn't have a real manpage)

2005-01-17 Thread Debian Bug Tracking System
Your message dated Mon, 17 Jan 2005 21:32:21 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#100982: fixed in hwtools 0.8-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 15 Jun 2001 10:53:14 +
>From [EMAIL PROTECTED] Fri Jun 15 05:53:14 2001
Return-path: <[EMAIL PROTECTED]>
Received: from studsv07.studserv.uni-stuttgart.de [:::129.69.21.37] 
by master.debian.org with esmtp (Exim 3.12 1 (Debian))
id 15ArE1-0007IQ-00; Fri, 15 Jun 2001 05:53:13 -0500
Received: from ysabell.wh.vaih [129.69.166.244] by 
studsv07.studserv.uni-stuttgart.de with ESMTP
  (SMTPD32-6.06) id A90C302200AA; Fri, 15 Jun 2001 12:53:00 +0200
Received: from marcelo by ysabell.wh.vaih with local (Exim 3.22 #1 (Debian))
id 15Aqwc-f3-00; Fri, 15 Jun 2001 12:35:14 +0200
Date: Fri, 15 Jun 2001 12:35:13 +0200
From: "Marcelo E. Magallon" <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: /sbin/inb doesn't have a real manpage
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.3.18i
X-Reportbug-Version: 1.17
X-Operating-System: Linux ysabell 2.4.4-xfs
Sender: "Marcelo E. Magallon" <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]

Package: hwtools
Version: 0.7-1
Severity: normal

Hi,

 /sbin/inb doesn't have a real manpage, but uses the undocumented.7 one
 instead.  That manpage says this has been reported as a bug, which is
 not true.

-- System Information
Debian Release: unstable
Architecture: i386
Kernel: Linux ysabell 2.4.4-xfs #1 Fri May 18 09:18:34 CEST 2001 i686
Locale: LANG=C, LC_CTYPE=en_US

Versions of packages hwtools depends on:
ii  libc6 2.2.3-6GNU C Library: Shared libraries an

-- 
Marcelo | I LIKE TO THINK I AM A PICKER-UP OF UNCONSIDERED
[EMAIL PROTECTED] | TRIFLES. Death grinned hopefully.
| -- (Terry Pratchett, Lords and Ladies)

---
Received: (at 100982-close) by bugs.debian.org; 18 Jan 2005 02:36:32 +
>From [EMAIL PROTECTED] Mon Jan 17 18:36:32 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CqjEO-0001X9-00; Mon, 17 Jan 2005 18:36:32 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CqjAL-000488-00; Mon, 17 Jan 2005 21:32:21 -0500
From: Pierre Ancelot <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#100982: fixed in hwtools 0.8-4
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 17 Jan 2005 21:32:21 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: hwtools
Source-Version: 0.8-4

We believe that the bug you reported is fixed in the latest version of
hwtools, which is due to be installed in the Debian FTP archive:

hwtools_0.8-4.diff.gz
  to pool/main/h/hwtools/hwtools_0.8-4.diff.gz
hwtools_0.8-4.dsc
  to pool/main/h/hwtools/hwtools_0.8-4.dsc
hwtools_0.8-4_i386.deb
  to pool/main/h/hwtools/hwtools_0.8-4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Pierre Ancelot <[EMAIL PROTECTED]> (supplier of updated hwtools package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Format: 1.7
Date: Wed, 17 Jan 2005 17:34:22 +0100
Source: hwtools
Binary: hwtools
Architecture: source i386
Version: 0.8-4
Distribution: unstable
Urgency: low
Maintainer: Pierre Ancelot <[EMAIL PROTECTED]>
Changed-By: Pierre Ancelot <[EMAIL PROTECTED]>
Description: 
 hwtools- collection of tools for low-level hardware management
Closes: 100982 211921
Changes: 
 hwtools (0.8-4) unstable; urgency=low