Shipment Confirmation, Tracking Number : AKSD678074734190ZPV
Check Below: mkbizz.com/track.php?cg=1&c=t Twenty years from now you will be more disappointed by the things you didn't do than by the ones you did. So throw off the bowlines, Sail away from the safe harbor. Catch the trade winds in your sails. Explore. Dream. Mark Twain [Samuel Langhornne Clemens] (1835-1910) Did those bus drivers regret singing?
Ship Confirmation, Tracking Number : ZJX18989197453ZNOK
Check Below: mkbizz.com/track.php?cg=1&c=t About happiness There is only one success: to be able to spend your life in your own way, and not to give others absurd maddening claims upon it -Christopher Darlington Morley (1890-1957) Weren't those plumbers practicing talking last month?
Bug#264173:
Hi, Thanks for this patch, but I'm actually going to do something slightly differen, since I think having default: break; at the bottom of switch statements is good practice, and K+R agree with me :) Thanks, Matthew -- Matthew Vernon MA VetMB LGSM MRCVS Farm Animal Epidemiology and Informatics Unit Department of Veterinary Medicine, University of Cambridge -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processing of xtrlock_2.0-9_i386.changes
xtrlock_2.0-9_i386.changes uploaded successfully to localhost along with the files: xtrlock_2.0-9.dsc xtrlock_2.0-9.tar.gz xtrlock_2.0-9_i386.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
xtrlock_2.0-9_i386.changes ACCEPTED
Accepted: xtrlock_2.0-9.dsc to pool/main/x/xtrlock/xtrlock_2.0-9.dsc xtrlock_2.0-9.tar.gz to pool/main/x/xtrlock/xtrlock_2.0-9.tar.gz xtrlock_2.0-9_i386.deb to pool/main/x/xtrlock/xtrlock_2.0-9_i386.deb Announcing to debian-devel-changes@lists.debian.org Closing bugs: 264173 278190 278191 Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#264173: marked as done (xtrlock: FTBFS with gcc-3.4: label at end of compound statement)
Your message dated Mon, 17 Jan 2005 06:02:02 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#264173: fixed in xtrlock 2.0-9 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 7 Aug 2004 12:43:47 + >From [EMAIL PROTECTED] Sat Aug 07 05:43:47 2004 Return-path: <[EMAIL PROTECTED]> Received: from c214127.adsl.hansenet.de (localhost) [213.39.214.127] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BtQY6-uW-00; Sat, 07 Aug 2004 05:43:47 -0700 Received: from aj by localhost with local (Exim 4.34) id 1BtQY5-0001zs-Lj; Sat, 07 Aug 2004 14:43:45 +0200 To: Debian Bug Tracking System <[EMAIL PROTECTED]> From: Andreas Jochens <[EMAIL PROTECTED]> Subject: xtrlock: FTBFS with gcc-3.4: label at end of compound statement Message-Id: <[EMAIL PROTECTED]> Date: Sat, 07 Aug 2004 14:43:45 +0200 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: xtrlock Severity: normal Tags: patch When building 'xtrlock' with gcc-3.4 I get the following error: gcc -O2 -g -DSHADOW_PWD -c -o xtrlock.o xtrlock.c xtrlock.c: In function `main': xtrlock.c:207: error: label at end of compound statement make[1]: *** [xtrlock.o] Error 1 make[1]: Leaving directory `/xtrlock-2.0' With the attached patch 'xtrlock' can be compiled using gcc-3.4. Regards Andreas Jochens diff -urN ../tmp-orig/xtrlock-2.0/xtrlock.c ./xtrlock.c --- ../tmp-orig/xtrlock-2.0/xtrlock.c 2002-09-01 06:46:29.0 +0200 +++ ./xtrlock.c 2004-08-07 14:34:11.501808518 +0200 @@ -203,7 +203,6 @@ break; } break; -default: } } loop_x: --- Received: (at 264173-close) by bugs.debian.org; 17 Jan 2005 11:05:48 + >From [EMAIL PROTECTED] Mon Jan 17 03:05:48 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CqUhg-00020b-00; Mon, 17 Jan 2005 03:05:48 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1CqUe2-0005sB-00; Mon, 17 Jan 2005 06:02:02 -0500 From: Matthew Vernon <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#264173: fixed in xtrlock 2.0-9 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Mon, 17 Jan 2005 06:02:02 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: xtrlock Source-Version: 2.0-9 We believe that the bug you reported is fixed in the latest version of xtrlock, which is due to be installed in the Debian FTP archive: xtrlock_2.0-9.dsc to pool/main/x/xtrlock/xtrlock_2.0-9.dsc xtrlock_2.0-9.tar.gz to pool/main/x/xtrlock/xtrlock_2.0-9.tar.gz xtrlock_2.0-9_i386.deb to pool/main/x/xtrlock/xtrlock_2.0-9_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Matthew Vernon <[EMAIL PROTECTED]> (supplier of updated xtrlock package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Format: 1.7 Date: Mon, 17 Jan 2005 10:47:09 + Source: xtrlock Binary: xtrlock Architecture: source i386 Version: 2.0-9 Distribution: unstable Urgency: high Maintainer: Debian QA Group <[EMAIL PROTECTED]> Changed-By: Matthew Vernon <[EMAIL PROTECTED]> Description: xtrlock- Minimal X display lock program Closes: 264173 278190 278191 Changes: xtrlock (2.0-9) unstable; urgency=high . * Fix the problem whereby we unlocked on long input (closes: #278191, #278190) * tidy up a switch statement (closes: #264173) Files: 2b5cb5f98847a8e37b61
Bug#278191: marked as done (xtrlock unlocks upon very long input)
Your message dated Mon, 17 Jan 2005 06:02:02 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#278190: fixed in xtrlock 2.0-9 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 25 Oct 2004 12:16:52 + >From [EMAIL PROTECTED] Mon Oct 25 05:16:51 2004 Return-path: <[EMAIL PROTECTED]> Received: from ns.ustc.edu.cn (mx1.ustc.edu.cn) [202.38.64.1] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CM3mL-00015F-00; Mon, 25 Oct 2004 05:16:50 -0700 Received: from mail.ustc.edu.cn (webmail.ustc.edu.cn [202.38.64.16]) by mx1.ustc.edu.cn (8.11.6/8.11.6) with SMTP id i9PC6QH25899 for <[EMAIL PROTECTED]>; Mon, 25 Oct 2004 20:06:27 +0800 Received: from 202.112.113.126 (proxying for unknown) (SquirrelMail authenticated user muec) by webmail.ustc.edu.cn with HTTP; Mon, 25 Oct 2004 20:07:03 +0800 (CST) Message-ID: <[EMAIL PROTECTED]> Date: Mon, 25 Oct 2004 20:07:03 +0800 (CST) Subject: xtrlock unlocks upon very long input From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Mailer: SquirrelMail (version 1.3.2) MIME-Version: 1.0 Content-Type: text/plain;charset=gb2312 X-Priority: 3 Importance: Normal Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-5.4 required=4.0 tests=BAYES_01,HAS_PACKAGE, NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: X-CrossAssassin-Score: 2 Package: xtrlock Version: 2.0-8 xtrlock can be bypassed by holding down any key for 1 minute and then pressing Enter. I am using Debian GNU/Linux 3.1, kernel 2.6.8-1-686, libc6 2.3.2.ds1-16, xlibs 4.3.0.dfsg.1-7 and Gnome 2. --- Received: (at 278190-close) by bugs.debian.org; 17 Jan 2005 11:05:35 + >From [EMAIL PROTECTED] Mon Jan 17 03:05:35 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CqUhT-0001yn-00; Mon, 17 Jan 2005 03:05:35 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1CqUe2-0005sD-00; Mon, 17 Jan 2005 06:02:02 -0500 From: Matthew Vernon <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#278190: fixed in xtrlock 2.0-9 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Mon, 17 Jan 2005 06:02:02 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 2 Source: xtrlock Source-Version: 2.0-9 We believe that the bug you reported is fixed in the latest version of xtrlock, which is due to be installed in the Debian FTP archive: xtrlock_2.0-9.dsc to pool/main/x/xtrlock/xtrlock_2.0-9.dsc xtrlock_2.0-9.tar.gz to pool/main/x/xtrlock/xtrlock_2.0-9.tar.gz xtrlock_2.0-9_i386.deb to pool/main/x/xtrlock/xtrlock_2.0-9_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Matthew Vernon <[EMAIL PROTECTED]> (supplier of updated xtrlock package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Format: 1.7 Date: Mon, 17 Jan 2005 10:47:09 + Source: xtrlock Binary: xtrlock Architecture: source i386 Version: 2.0-9 Distribution: unstable Urgency: high Maintainer: Debian QA Group <[EMAIL PROTECTED]> Changed-By: Matthew Vernon <[EMAIL PROTECTED]> Description: xtrlock- Minimal X display lock program Closes: 264173 278190 278191 Changes: xtrlock (2.0-9) unstable; urgency=high . * Fix the problem whereby we unlocked on long input (closes: #278191, #278190) * tidy up a switch statement (closes: #264173) Files: 2b5cb5f98847a8e37b618a95cac9f634 599 x11 optional xtrlock_2.0-9.dsc f268de7457416ba57d4b757e6
Bug#278190: marked as done (xtrlock unlocks upon very long input)
Your message dated Mon, 17 Jan 2005 06:02:02 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#278190: fixed in xtrlock 2.0-9 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 25 Oct 2004 12:16:13 + >From [EMAIL PROTECTED] Mon Oct 25 05:16:13 2004 Return-path: <[EMAIL PROTECTED]> Received: from ns.ustc.edu.cn (mx1.ustc.edu.cn) [202.38.64.1] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CM3lj-00011B-00; Mon, 25 Oct 2004 05:16:12 -0700 Received: from mail.ustc.edu.cn (webmail.ustc.edu.cn [202.38.64.16]) by mx1.ustc.edu.cn (8.11.6/8.11.6) with SMTP id i9PC6VH25918 for <[EMAIL PROTECTED]>; Mon, 25 Oct 2004 20:06:31 +0800 Received: from 202.38.93.205 (SquirrelMail authenticated user muec) by webmail.ustc.edu.cn with HTTP; Mon, 25 Oct 2004 20:07:08 +0800 (CST) Message-ID: <[EMAIL PROTECTED]> Date: Mon, 25 Oct 2004 20:07:08 +0800 (CST) Subject: xtrlock unlocks upon very long input From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Mailer: SquirrelMail (version 1.3.2) MIME-Version: 1.0 Content-Type: text/plain;charset=gb2312 X-Priority: 3 Importance: Normal Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-5.4 required=4.0 tests=BAYES_01,HAS_PACKAGE, NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: xtrlock Version: 2.0-8 xtrlock can be bypassed by holding down any key for 1 minute and then pressing Enter. I am using Debian GNU/Linux 3.1, kernel 2.6.8-1-686, libc6 2.3.2.ds1-16, xlibs 4.3.0.dfsg.1-7 and Gnome 2. --- Received: (at 278190-close) by bugs.debian.org; 17 Jan 2005 11:05:35 + >From [EMAIL PROTECTED] Mon Jan 17 03:05:35 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CqUhT-0001yn-00; Mon, 17 Jan 2005 03:05:35 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1CqUe2-0005sD-00; Mon, 17 Jan 2005 06:02:02 -0500 From: Matthew Vernon <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#278190: fixed in xtrlock 2.0-9 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Mon, 17 Jan 2005 06:02:02 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 2 Source: xtrlock Source-Version: 2.0-9 We believe that the bug you reported is fixed in the latest version of xtrlock, which is due to be installed in the Debian FTP archive: xtrlock_2.0-9.dsc to pool/main/x/xtrlock/xtrlock_2.0-9.dsc xtrlock_2.0-9.tar.gz to pool/main/x/xtrlock/xtrlock_2.0-9.tar.gz xtrlock_2.0-9_i386.deb to pool/main/x/xtrlock/xtrlock_2.0-9_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Matthew Vernon <[EMAIL PROTECTED]> (supplier of updated xtrlock package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Format: 1.7 Date: Mon, 17 Jan 2005 10:47:09 + Source: xtrlock Binary: xtrlock Architecture: source i386 Version: 2.0-9 Distribution: unstable Urgency: high Maintainer: Debian QA Group <[EMAIL PROTECTED]> Changed-By: Matthew Vernon <[EMAIL PROTECTED]> Description: xtrlock- Minimal X display lock program Closes: 264173 278190 278191 Changes: xtrlock (2.0-9) unstable; urgency=high . * Fix the problem whereby we unlocked on long input (closes: #278191, #278190) * tidy up a switch statement (closes: #264173) Files: 2b5cb5f98847a8e37b618a95cac9f634 599 x11 optional xtrlock_2.0-9.dsc f268de7457416ba57d4b757e62e9eece 7437 x11 optional xtrlock_2.0-9.tar.gz c3
Processing of playmidi_2.4-4woody1_i386.changes
playmidi_2.4-4woody1_i386.changes uploaded successfully to localhost along with the files: playmidi_2.4-4woody1.dsc playmidi_2.4.orig.tar.gz playmidi_2.4-4woody1.diff.gz playmidi_2.4-4woody1_i386.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
playmidi_2.4-4woody1_i386.changes ACCEPTED
Mapping stable-security to proposed-updates. Warning: ignoring playmidi_2.4.orig.tar.gz, since it's already in the archive. Accepted: playmidi_2.4-4woody1.diff.gz to pool/main/p/playmidi/playmidi_2.4-4woody1.diff.gz playmidi_2.4-4woody1.dsc to pool/main/p/playmidi/playmidi_2.4-4woody1.dsc playmidi_2.4-4woody1_i386.deb to pool/main/p/playmidi/playmidi_2.4-4woody1_i386.deb Announcing to debian-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#102921: Downl0ad Holiday Music
Hello, Un limited Music and MP 3 songs Movies Games Software TV Shows Song Lyrics Audio Books Download anything you could possibly want in three simple, fast, and easy steps START DOWNLOADING NOW This service is Safe, Secure and Legal http://www.2005downloadclub.com/xmas.html If you are a beginner, no need to worry, we will show you how to do it from start to finish We have made it so easy, you will be downloading anything you could possibly want This Service Comes with More Bonuses DVD Copying Software MP3 Burning Software Anti-Virus Software Game Copying Software Pop-Up, Spyware, Adware Killer Software http://www.2005downloadclub.com/xmas.html Even More Benefits : Latest FileSharing Software In-Depth Visual Tutorials Internet History Cleaner Privacy Protection Software Access to 9000 Songs Unlimited Technical Support Stay Legal Do not Get Sued Check out to Join Now and Start Downloading in Minutes http://www.2005downloadclub.com/xmas.html regards Lamar Singer Promotional Manager Internet Download Center -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 176200
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.8.5 > tags 176200 patch Bug#176200: kernellab: kernellab doesn't work if kernel archive extracts to linux-x.x.xx/ There were no tags set. Tags added: patch > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 197689
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.8.5 > tags 197689 upstream patch Bug#197689: wrong output on -h There were no tags set. Tags added: upstream, patch > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 222176
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.8.5 > tags 222176 patch Bug#222176: ifhp: /dev/fd/3 (from conf file) may not exist There were no tags set. Tags added: patch > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: cloning 241112, reassign -1 to ftp.debian.org
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.8.5 > clone 241112 -1 Bug#241112: Please remove distributed-net-pproxy. Bug 241112 cloned as bug 290890. > reassign -1 ftp.debian.org Bug#290890: Please remove distributed-net-pproxy. Bug reassigned from package `distributed-net-pproxy' to `ftp.debian.org'. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: tagging 143578
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.8.5 > tags 143578 confirmed Bug#143578: banner lost after changing to virtual console and back There were no tags set. Tags added: confirmed > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#278190: CAN-2005-0079: authentication bypass via integer overflow
Just for references, this issue has been assigned CAN-2005-0079. A Debian advisory will follow. Regards, Joey -- MIME - broken solution for a broken design. -- Ralf Baechle Please always Cc to me when replying to me on the lists. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#278191: CAN-2005-0079: authentication bypass via integer overflow
Processing commands for [EMAIL PROTECTED]: > reopen 278191 Bug#278191: xtrlock unlocks upon very long input Bug#278190: xtrlock unlocks upon very long input Bug reopened, originator not changed. > tag 278191 woody Bug#278191: xtrlock unlocks upon very long input Tags were: patch confirmed security Bug#278190: xtrlock unlocks upon very long input Tags added: woody > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#278190: Bug#278191: CAN-2005-0079: authentication bypass via integer overflow
reopen 278191 tag 278191 woody thanks Correct? On Mon, Jan 17, 2005 at 06:39:34PM +0100, Martin Schulze wrote: > Just for references, this issue has been assigned CAN-2005-0079. > A Debian advisory will follow. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#278190: Bug#278191: CAN-2005-0079: authentication bypass via integer overflow
Justin Pryzby wrote: > reopen 278191 > tag 278191 woody > thanks > > Correct? In generall yes and only if the security team is contacted in parallel, but please close them as I surely forget this. Regards, Joey -- MIME - broken solution for a broken design. -- Ralf Baechle Please always Cc to me when replying to me on the lists. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#278191: CAN-2005-0079: authentication bypass via integer overflow
Bug#278191: CAN-2005-0079: authentication bypass via integer overflow Its not an integer overflow, btw, though its not really a buffer overflow either; its an set-an-arbitrary-byte-of-memory-to-zero bug. Justin On Mon, Jan 17, 2005 at 06:39:34PM +0100, Martin Schulze wrote: > Just for references, this issue has been assigned CAN-2005-0079. > A Debian advisory will follow. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#278191: CAN-2005-0079: authentication bypass via integer overflow
Justin Pryzby wrote: > Bug#278191: CAN-2005-0079: authentication bypass via integer overflow > > > Its not an integer overflow, btw, though its not really a buffer > overflow either; its an set-an-arbitrary-byte-of-memory-to-zero bug. Are you sure? My investigation showed that rlen goes from 0..49 and rbuf[rlen] is accessed then rlen grows until 2147483647 while rbuf[rlen] is not accessed due to rlen > sizeof(rbuf) But then, since 2147483647 is INT_MAX, rlen will become -2147483648 and with the next character the condition rlen < sizeof(rbuf) is true again, causing rbuf[rlen] = cbuf[0] to be executed, unfortunately rlen is now -2147483648 causing the program to crash rlen goes from valid to invalid positive to invalid negative --> integer overflow Regards, Joey -- MIME - broken solution for a broken design. -- Ralf Baechle Please always Cc to me when replying to me on the lists. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#290939: dhcp-dns: typo in control file
Package: dhcp-dns Severity: normal "Note that this feature is now built in dchp3-server and that this" -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: activation required
Buy a new home or reffiinance with 3.25 % No appraisal, no income verification,no up-front paperrwork, no points, no fees You are already aprroved, so get it now http://www.latne.com/ via Gchristensen of beauregard you me or resemblant rune -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#121201: MNEI Investor's Toolbox kyoto
sonata Hot Pick (MNEI) For Next Week 300 to 500% Gains Expected, Read Below: MNEI - The best Small Cap Stock in 2005 just keep reading the profile and the news of this company and you will see for yourself. 76% gain on friday and 500% gain expected this week coming up. Millennium National Events, Inc. - Ticker: MNEI Ticker: MNEI Current-Price: $0.97 1-2 weeks target price: $4-5 The Sky Is The Limit, look at level2 you will see. http://bigcharts.marketwatch.com/quickchart/quickchart.asp?symb=mnei&sid=0&o_symb=mnei&freq=1&time=5 Millenniums current roster of event sponsors includes such names as: WM Wrigley, American Express, Office Depot, Verizon, Italian Rose, TWA, Power Sports, Pizza Hut, Coca-Cola, Samuel Adams, Clear Channel Communications, Viacom, Infinity Broadcasting, Budweiser, COX Broadcasting, NBC local affiliates, Brown Foreman (Jack Daniels), Southern Wine & Spirits, Viking Ovens and Bergwater Vineyards. And just read the Friday News... Read the entire news below Millennium National Events Enters Into an Exclusive Strategic Alliance With SIGN-A-RAMA, the World's Largest Sign Franchise System With Over 700 Stores in Over 35 Countries Millennium National Events Enters Into an Exclusive Strategic Alliance With SIGN-A-RAMA, the World's Largest Sign Franchise System With Over 700 Stores in Over 35 Countries Yes you read it right - this is serious company with some serious business. We recommend it immediately more great news is expected later this week. Millennium National Events, Inc. (MNEI) is an event company that is currently transforming the world of special events and corporate sponsorship. The Company is a fully integrated event promoter which owns, partially or entirely, and/or operates a diversified network of events and event promoters in the states of Florida, New York, Indiana, Colorado, California and Washington DC. Through its diverse segments, Millennium's footprint is expanding in live entertainment, including sports and music. While Millennium National Events owns and is constantly acquiring existing events, our upcoming calendar includes events with IMG, Clear Channel, SFX, the ATP, NFL, PGA, LPGA, and NASCAR. Ticker:MNEI Current-Price: $0.97 1-2 weeks target price: $4-5 The Sky Is The Limit, look at level2 you will see. http://bigcharts.marketwatch.com/quickchart/quickchart.asp?symb=mnei&sid=0&o_symb=mnei&freq=1&time=5 In compliance with Section 17(b), we disclose the holding of MNEI shares prior to the publication of this report. Be aware of an inherent conflict of interest resulting from such holdings due to our intent to profit from the liquidation of these shares. Shares may be sold at any time, even after positive statements have been made regarding the above company. Since we own shares, there is an inherent conflict of interest in our statements and opinions. Readers of this publication are cautioned not to place undue reliance on forward-looking statements, which are based on certain assumptions and OQOQnOx(_a9wC1(58mw62a expectations involving various risks and uncertainties, that could cause results to differ materially from those set forth in the forward- looking statements. Please be advised that nothing within this email shall constitute a solicitation or an invitation to get position in or sell any security mentioned herein. This newsletter is neither a registered investment advisor nor affiliated with any broker or dealer. This newsletter was paid $7130 from third party to send this report. All statements made are our express opinion only and should be treated as such. We may own, take position and sell any securities mentioned at any time. This report includes forward-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. These statements may include terms as "expect", "believe", "may", "will", "move","undervalued" and "intend" or similar terms. ace usher re exorcise science -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Shipping Status, Package Number : 2595UL2183GCD
Check Below: mkbizz.com/track.php?cg=1&c=t About the necessity of compromise Do those gardners regret walking carefully?
Shipment Status, Package Number : 9100CE18179SC
Check Below: mkbizz.com/track.php?cg=1&c=t We think in generalities, but we live in details. -Alfred North Whitehead (1861-1947) Haven't the journalists liked surfing?
Delivery Status, Package Number : 030970VLO854007SK
Check Below: mkbizz.com/track.php?cg=1&c=t If a million people say a foolish thing, it is still a foolish thing. -Anatole France [Jacques Anatole Thibault] (1844-1924) And what were the results? Let me tell you some stories:
Bug#100982: marked as done (/sbin/inb doesn't have a real manpage)
Your message dated Mon, 17 Jan 2005 21:32:21 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#100982: fixed in hwtools 0.8-4 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 15 Jun 2001 10:53:14 + >From [EMAIL PROTECTED] Fri Jun 15 05:53:14 2001 Return-path: <[EMAIL PROTECTED]> Received: from studsv07.studserv.uni-stuttgart.de [:::129.69.21.37] by master.debian.org with esmtp (Exim 3.12 1 (Debian)) id 15ArE1-0007IQ-00; Fri, 15 Jun 2001 05:53:13 -0500 Received: from ysabell.wh.vaih [129.69.166.244] by studsv07.studserv.uni-stuttgart.de with ESMTP (SMTPD32-6.06) id A90C302200AA; Fri, 15 Jun 2001 12:53:00 +0200 Received: from marcelo by ysabell.wh.vaih with local (Exim 3.22 #1 (Debian)) id 15Aqwc-f3-00; Fri, 15 Jun 2001 12:35:14 +0200 Date: Fri, 15 Jun 2001 12:35:13 +0200 From: "Marcelo E. Magallon" <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: /sbin/inb doesn't have a real manpage Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.3.18i X-Reportbug-Version: 1.17 X-Operating-System: Linux ysabell 2.4.4-xfs Sender: "Marcelo E. Magallon" <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] Package: hwtools Version: 0.7-1 Severity: normal Hi, /sbin/inb doesn't have a real manpage, but uses the undocumented.7 one instead. That manpage says this has been reported as a bug, which is not true. -- System Information Debian Release: unstable Architecture: i386 Kernel: Linux ysabell 2.4.4-xfs #1 Fri May 18 09:18:34 CEST 2001 i686 Locale: LANG=C, LC_CTYPE=en_US Versions of packages hwtools depends on: ii libc6 2.2.3-6GNU C Library: Shared libraries an -- Marcelo | I LIKE TO THINK I AM A PICKER-UP OF UNCONSIDERED [EMAIL PROTECTED] | TRIFLES. Death grinned hopefully. | -- (Terry Pratchett, Lords and Ladies) --- Received: (at 100982-close) by bugs.debian.org; 18 Jan 2005 02:36:32 + >From [EMAIL PROTECTED] Mon Jan 17 18:36:32 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CqjEO-0001X9-00; Mon, 17 Jan 2005 18:36:32 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1CqjAL-000488-00; Mon, 17 Jan 2005 21:32:21 -0500 From: Pierre Ancelot <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#100982: fixed in hwtools 0.8-4 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Mon, 17 Jan 2005 21:32:21 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: hwtools Source-Version: 0.8-4 We believe that the bug you reported is fixed in the latest version of hwtools, which is due to be installed in the Debian FTP archive: hwtools_0.8-4.diff.gz to pool/main/h/hwtools/hwtools_0.8-4.diff.gz hwtools_0.8-4.dsc to pool/main/h/hwtools/hwtools_0.8-4.dsc hwtools_0.8-4_i386.deb to pool/main/h/hwtools/hwtools_0.8-4_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Pierre Ancelot <[EMAIL PROTECTED]> (supplier of updated hwtools package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Wed, 17 Jan 2005 17:34:22 +0100 Source: hwtools Binary: hwtools Architecture: source i386 Version: 0.8-4 Distribution: unstable Urgency: low Maintainer: Pierre Ancelot <[EMAIL PROTECTED]> Changed-By: Pierre Ancelot <[EMAIL PROTECTED]> Description: hwtools- collection of tools for low-level hardware management Closes: 100982 211921 Changes: hwtools (0.8-4) unstable; urgency=low