Debian Bug report logs - #468801
libc6: RFC3484 scoping rules should only affect IPv6, not IPv4

spacer

Package: libc6; Maintainer for libc6 is GNU Libc Maintainers <debian-glibc@lists.debian.org>; Source for libc6 is src:eglibc.

Reported by: "Rémi Denis-Courmont" <remi@remlab.net>

Date: Sat, 1 Mar 2008 15:24:02 UTC

Severity: normal

Tags: fixed-upstream, patch

Found in version glibc/2.7-9

Fixed in version eglibc/2.10.2-7

Done: Clint Adams <schizo@debian.org>

Bug is archived. No further changes may be made.

Forwarded to sourceware.org/bugzilla/show_bug.cgi?id=5873

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, GNU Libc Maintainers <debian-glibc@lists.debian.org>:
Bug#468801; Package libc6. Full text and rfc822 format available.

Acknowledgement sent to Remi Denis-Courmont <rdenis@simphalempin.com>:
New Bug report received and forwarded. Copy sent to GNU Libc Maintainers <debian-glibc@lists.debian.org>. Full text and rfc822 format available.

Message #5 received at submit@bugs.debian.org (full text, mbox):

From: Remi Denis-Courmont <rdenis@simphalempin.com>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: libc6: RFC3484 scoping rules should only affect IPv6, not IPv4
Date: Sat, 01 Mar 2008 17:21:31 +0200
Package: libc6
Version: 2.7-9
Severity: normal
Tags: patch


	Hello,

Rule 2 of the Destination Address Selection algorithm in RFC3484
specifies:

| Rule 2:  Prefer matching scope.
| If Scope(DA) = Scope(Source(DA)) and Scope(DB) <> Scope(Source(DB)),
| then prefer DA.  Similarly, if Scope(DA) <> Scope(Source(DA)) and
| Scope(DB) = Scope(Source(DB)), then prefer DB.

This rule makes lots of sense for IPv6 addresses - hosts should not try
to use link-local destinations with global source addresses or
vice-versa.

However, glibc extends this rule to IPv4 as well: private RFC1918 IPv4
addresses are taken as a different scope from public IPv6 addresses.
This does not make much sense, especially with the widespread adoption
of Network Address Translation.

Because of this, a host with a (NATed) private IPv4 address and a 6to4
(2002::/16, global scope) or Teredo (2001:0::/32, global scope) IPv6
address will first try to use 6to4 or Teredo to reach any "native" IPv6
destination. Because 6to4 and especially Teredo are by design not very
reliable (depends on public relay), this often breaks connectivity
between 6to4/Teredo and native IPv6 nodes. IPv4 should be preferred.

Note that Windows (which could perhaps? be taken as the reference
implementation of RFC3484??) does prefer IPv4 in this case. Also note
that this make the separate 6to4 and Teredo _labels_ from inside the
Linux kernel and from /etc/gai.conf pretty useless. Finally, it violates
the RFC4380 requirement that Teredo be used as a last resort - i.e.
after IPv4.

Unfortunately, Rule 2 cannot even be configured or overriden in anyway.
The first configurable rule is number 5.

Trivial patch follows:

diff -Nru glibc-2.7.orig/sysdeps/posix/getaddrinfo.c
glibc-2.7/sysdeps/posix/getaddrinfo.c
--- glibc-2.7.orig/sysdeps/posix/getaddrinfo.c  2008-03-01
17:18:48.000000000 +0200
+++ glibc-2.7/sysdeps/posix/getaddrinfo.c       2008-03-01
17:20:20.000000000 +0200
@@ -1039,9 +1039,6 @@
         169.254/16 and 127/8 are link-local.  */
       if ((addr[0] == 169 && addr[1] == 254) || addr[0] == 127)
        scope = 2;
-      else if (addr[0] == 10 || (addr[0] == 172 && (addr[1] & 0xf0) ==
       16)
-              || (addr[0] == 192 && addr[1] == 168))
-       scope = 5;
       else
        scope = 14;
     }

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (100, 'unstable'), (100, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.24.2 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libc6 depends on:
ii  libgcc1                 1:4.3-20080227-1 GCC support library

libc6 recommends no packages.

-- debconf information:
  glibc/upgrade: true
  glibc/restart-failed:
  glibc/restart-services:




Information forwarded to debian-bugs-dist@lists.debian.org, GNU Libc Maintainers <debian-glibc@lists.debian.org>:
Bug#468801; Package libc6. Full text and rfc822 format available.

Acknowledgement sent to Aurelien Jarno <aurelien@aurel32.net>:
Extra info received and forwarded to list. Copy sent to GNU Libc Maintainers <debian-glibc@lists.debian.org>. Full text and rfc822 format available.

Message #10 received at 468801@bugs.debian.org (full text, mbox):

From: Aurelien Jarno <aurelien@aurel32.net>
To: Remi Denis-Courmont <rdenis@simphalempin.com>, 
 468801@bugs.debian.org
Subject: Re: Bug#468801: libc6: RFC3484 scoping rules should only affect IPv6,
 not IPv4
Date: Wed, 05 Mar 2008 11:31:22 +0100
Remi Denis-Courmont a écrit :
> Package: libc6
> Version: 2.7-9
> Severity: normal
> Tags: patch
> 
> 
> 	Hello,
> 
> Rule 2 of the Destination Address Selection algorithm in RFC3484
> specifies:
> 
> | Rule 2:  Prefer matching scope.
> | If Scope(DA) = Scope(Source(DA)) and Scope(DB) <> Scope(Source(DB)),
> | then prefer DA.  Similarly, if Scope(DA) <> Scope(Source(DA)) and
> | Scope(DB) = Scope(Source(DB)), then prefer DB.
> 
> This rule makes lots of sense for IPv6 addresses - hosts should not try
> to use link-local destinations with global source addresses or
> vice-versa.
> 
> However, glibc extends this rule to IPv4 as well: private RFC1918 IPv4
> addresses are taken as a different scope from public IPv6 addresses.

Note that it is note a glibc extension. It is defined in the RFC3484:

|  IPv4 addresses are assigned scopes as follows.  IPv4 auto-
|  configuration addresses [9], which have the prefix 169.254/16, are
|  assigned link-local scope.  IPv4 private addresses [12], which have
|  the prefixes 10/8, 172.16/12, and 192.168/16, are assigned site-local
|  scope.  IPv4 loopback addresses [12, section 4.2.2.11], which have
|  the prefix 127/8, are assigned link-local scope (analogously to the
|  treatment of the IPv6 loopback address [11, section 4]).  Other IPv4
|  addresses are assigned global scope.

-- 
  .''`.  Aurelien Jarno	            | GPG: 1024D/F1BCDB73
 : :' :  Debian developer           | Electrical Engineer
 `. `'   aurel32@debian.org         | aurelien@aurel32.net
   `-    people.debian.org/~aurel32 | www.aurel32.net




Noted your statement that Bug has been forwarded to sourceware.org/bugzilla/show_bug.cgi?id=5873. Request was from Aurelien Jarno <aurel32@debian.org> to control@bugs.debian.org. (Wed, 05 Mar 2008 10:51:03 GMT) Full text and rfc822 format available.

Tags added: fixed-upstream Request was from bts-link-upstream@lists.alioth.debian.org to control@bugs.debian.org. (Sat, 12 Apr 2008 21:48:20 GMT) Full text and rfc822 format available.

Information forwarded to debian-bugs-dist@lists.debian.org, GNU Libc Maintainers <debian-glibc@lists.debian.org>:
Bug#468801; Package libc6. (Sun, 04 Apr 2010 18:33:06 GMT) Full text and rfc822 format available.

Acknowledgement sent to Tore Anderson <tore@fud.no>:
Extra info received and forwarded to list. Copy sent to GNU Libc Maintainers <debian-glibc@lists.debian.org>. (Sun, 04 Apr 2010 18:33:06 GMT) Full text and rfc822 format available.

Message #19 received at 468801@bugs.debian.org (full text, mbox):

From: Tore Anderson <tore@fud.no>
To: 468801@bugs.debian.org
Subject: Re: libc6: RFC3484 scoping rules should only affect IPv6, not IPv4
Date: Sun, 04 Apr 2010 20:08:41 +0200
Hi,

The current practise of scoping RFC 3484-addresses as site-local is
causing real operational problems on today's internet, and is
inhibiting the rollout of IPv6 on the content side:

Consider a setup where an end user has his computer on a LAN with RFC
1918-based private IPv4 addresses (using NAT to connect to the global
internet), as well as 6to4-based IPv6 addresses (or could be Teredo for
that matter).  In this case, when a web server is dual-stacked,
getaddrinfo() will sort the 6to4-based IPv6 connectivity above the
NAT-based IPv4 one.

Transitional IPv6 tunneling like 6to4 is inherently less reliable than
the IPv4 connectivity it runs on top of, so if the user has non-working
transitional IPv6 connectivity (quite common), he will experience a
dual-stacked web site as being simply down, or extremely slow (as all
connection attempts over IPv6 needs to time out before the browser
falls back to IPv4).  Since web site operators are usually interested
in having as many visitors as possible, the prospect of actually making
the site unavailable for a not insignificant amount of users are
keeping them from deploying IPv6 altogether.

Rémi has documented the problem in detail here:

tools.ietf.org/html/draft-denis-v6ops-nat-addrsel-00

There's currently a draft out that aims to correct this shortcoming
(amongst others) in the original RFC:

tools.ietf.org/html/draft-arifumi-6man-rfc3484-revise-02

Quote:

> 2.7.  To change private IPv4 address scope
>
>  As detailed in Remi's draft [I-D.denis-v6ops-nat-addrsel], when a
>  host is in NATed site, and has a private IPv4 address and
>  transitional addresses like 6to4 and Teredo, the host chooses
>  transitional IPv6 address to access most of the dual-stack servers.
>
>  This is because private IPv4 address is defined to be site-local
>  scope, and as in RFC 3484, the scope matching rules (Rule 2) set
>  lower priority for private IPv4 address.
>
>  By changing the address scope of private IPv4 address to global, this
>  problem can be solved.

It's worth nothing that FreeBSD and Microsoft appears to already have
changed their getaddrinfo() implementations accordingly.  Considering
that the original RFC was written by Microsoft to begin with, this is
in my opinion a clear admission that this is a shortcoming of the RFC.

I have submitted a bug about the problem to the upstream glibc
maintainers:

sourceware.org/bugzilla/show_bug.cgi?id=11438

The feedback I got was basically that while he agrees there is a real
problem here, he is reluctant to make the upstream change until the
standardisation process is finished.  However, he goes on to suggest
that the distributors should work around the problem locally in the
meanwhile.

Because this bug is causing real operational problems that are holding
back the IPv6 rollout, and with less then a year's worth of IPv4
addresses left in the IANA pool (cf. ipv4depletion.com/), it is
really starting to become urgent to get these operational issues fixed
ASAP.  I therefore hope that Debian can help out by implementing the
suggested change, either by shipping the /etc/gai.conf file by default,
or by modifying the getaddrinfo.c sources, so that RFC 1918-based
addresses are treated as globally scoped by default.

Best regards,
-- 
Tore Anderson




Information forwarded to debian-bugs-dist@lists.debian.org, GNU Libc Maintainers <debian-glibc@lists.debian.org>:
Bug#468801; Package libc6. (Tue, 06 Apr 2010 14:48:03 GMT) Full text and rfc822 format available.

Acknowledgement sent to Tore Anderson <tore@fud.no>:
Extra info received and forwarded to list. Copy sent to GNU Libc Maintainers <debian-glibc@lists.debian.org>. (Tue, 06 Apr 2010 14:48:03 GMT) Full text and rfc822 format available.

Message #24 received at 468801@bugs.debian.org (full text, mbox):

From: Tore Anderson <tore@fud.no>
To: 468801@bugs.debian.org
Subject: Re: Bug#468801: libc6: RFC3484 scoping rules should only affect IPv6,
 not IPv4
Date: Tue, 06 Apr 2010 16:43:00 +0200
[Message part 1 (text/plain, inline)]
Just a little update here: Fedora has commited the change and it'll be
part of F13. See <https://bugzilla.redhat.com/show_bug.cgi?id=577626>. I
have tested their patch (attached) and it works as expected.

It would really be fantastic if this could be commited to Debian as well!

Best regards,
-- 
Tore Anderson
[glibc-gai-rfc3484.patch (text/plain, attachment)]

Changed Bug submitter to '"Rémi Denis-Courmont" <remi@remlab.net>' from 'Remi Denis-Courmont <rdenis@simphalempin.com>' Request was from "Rémi Denis-Courmont" <remi@remlab.net> to control@bugs.debian.org. (Sat, 10 Apr 2010 09:57:10 GMT) Full text and rfc822 format available.

Information forwarded to debian-bugs-dist@lists.debian.org, GNU Libc Maintainers <debian-glibc@lists.debian.org>:
Bug#468801; Package libc6. (Sat, 17 Apr 2010 09:48:03 GMT) Full text and rfc822 format available.

Acknowledgement sent to Tore Anderson <tore@fud.no>:
Extra info received and forwarded to list. Copy sent to GNU Libc Maintainers <debian-glibc@lists.debian.org>. (Sat, 17 Apr 2010 09:48:03 GMT) Full text and rfc822 format available.

Message #31 received at 468801@bugs.debian.org (full text, mbox):

From: Tore Anderson <tore@fud.no>
To: 468801@bugs.debian.org
Cc: "Rémi Denis-Courmont" <remi@remlab.net>
Subject: Re: Bug#468801: libc6: RFC3484 scoping rules should only affect IPv6,
 not IPv4
Date: Sat, 17 Apr 2010 11:44:36 +0200
Hi,

another update here:  Ubuntu has also applied the patch to their libc
package, see <https://bugs.launchpad.net/555210>, and it will as I
understand it be part of their release that's due in a couple of weeks.

It would be great if Debian could also apply the patch.  That is clearly
the behaviour that will serve end users the best.

Best regards,
-- 
Tore Anderson




Information forwarded to debian-bugs-dist@lists.debian.org, GNU Libc Maintainers <debian-glibc@lists.debian.org>:
Bug#468801; Package libc6. (Sun, 18 Apr 2010 01:09:03 GMT) Full text and rfc822 format available.

Acknowledgement sent to md@Linux.IT (Marco d'Itri):
Extra info received and forwarded to list. Copy sent to GNU Libc Maintainers <debian-glibc@lists.debian.org>. (Sun, 18 Apr 2010 01:09:04 GMT) Full text and rfc822 format available.

Message #36 received at 468801@bugs.debian.org (full text, mbox):

From: md@Linux.IT (Marco d'Itri)
To: Tore Anderson <tore@fud.no>, 468801@bugs.debian.org
Cc: Rémi Denis-Courmont <remi@remlab.net>
Subject: Re: Bug#468801: libc6: RFC3484 scoping rules should only affect
	IPv6, not IPv4
Date: Sun, 18 Apr 2010 00:01:18 +0200
[Message part 1 (text/plain, inline)]
On Apr 17, Tore Anderson <tore@fud.no> wrote:

> It would be great if Debian could also apply the patch.  That is clearly
> the behaviour that will serve end users the best.
Agreed. Can the libc maintainers please comment on this issue?

The next Debian release will be used in a period in which more and more
sites will deploy IPv6 and we must be sure to not make them less
reliable for the people adopting transition mechanisms.

-- 
ciao,
Marco
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, GNU Libc Maintainers <debian-glibc@lists.debian.org>:
Bug#468801; Package libc6. (Wed, 21 Apr 2010 17:51:03 GMT) Full text and rfc822 format available.

Acknowledgement sent to Tore Anderson <tore@fud.no>:
Extra info received and forwarded to list. Copy sent to GNU Libc Maintainers <debian-glibc@lists.debian.org>. (Wed, 21 Apr 2010 17:51:04 GMT) Full text and rfc822 format available.

Message #41 received at 468801@bugs.debian.org (full text, mbox):

From: Tore Anderson <tore@fud.no>
To: 468801@bugs.debian.org
Cc: Marco d'Itri <md@Linux.IT>, Rémi Denis-Courmont
 <remi@remlab.net>
Subject: Re: Bug#468801: libc6: RFC3484 scoping rules should only affect IPv6,
 not IPv4
Date: Wed, 21 Apr 2010 19:48:47 +0200
* Marco d'Itri

> Agreed. Can the libc maintainers please comment on this issue?
> 
> The next Debian release will be used in a period in which more and more
> sites will deploy IPv6 and we must be sure to not make them less
> reliable for the people adopting transition mechanisms.

Just adding some information here - I've asked a number of other
distributors, and currently Debian is the only one that has not yet
applied the patch to its developement branch (or stated an intention to
do so).  See:

https://bugzilla.redhat.com/show_bug.cgi?id=577626
https://bugs.launchpad.net/glibc/+bug/555210
bugs.gentoo.org/show_bug.cgi?id=315977
https://bugzilla.novell.com/show_bug.cgi?id=597616
https://qa.mandriva.com/show_bug.cgi?id=58834

Best regards,
-- 
Tore Anderson




Information forwarded to debian-bugs-dist@lists.debian.org, GNU Libc Maintainers <debian-glibc@lists.debian.org>:
Bug#468801; Package libc6. (Thu, 22 Apr 2010 08:03:06 GMT) Full text and rfc822 format available.

Acknowledgement sent to Aurelien Jarno <aurelien@aurel32.net>:
Extra info received and forwarded to list. Copy sent to GNU Libc Maintainers <debian-glibc@lists.debian.org>. (Thu, 22 Apr 2010 08:03:06 GMT) Full text and rfc822 format available.

Message #46 received at 468801@bugs.debian.org (full text, mbox):

From: Aurelien Jarno <aurelien@aurel32.net>
To: Tore Anderson <tore@fud.no>, 468801@bugs.debian.org
Cc: Marco d'Itri <md@Linux.IT>, Rémi Denis-Courmont
 <remi@remlab.net>
Subject: Re: Bug#468801: libc6: RFC3484 scoping rules should only affect IPv6,
 not IPv4
Date: Thu, 22 Apr 2010 09:58:54 +0200
Tore Anderson a écrit :
> * Marco d'Itri
> 
>> Agreed. Can the libc maintainers please comment on this issue?
>>
>> The next Debian release will be used in a period in which more and more
>> sites will deploy IPv6 and we must be sure to not make them less
>> reliable for the people adopting transition mechanisms.
> 
> Just adding some information here - I've asked a number of other
> distributors, and currently Debian is the only one that has not yet
> applied the patch to its developement branch (or stated an intention to
> do so).  See:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=577626
> https://bugs.launchpad.net/glibc/+bug/555210
> bugs.gentoo.org/show_bug.cgi?id=315977
> https://bugzilla.novell.com/show_bug.cgi?id=597616
> https://qa.mandriva.com/show_bug.cgi?id=58834
> 

I will apply the patch if I got some time to work on glibc again.


-- 
Aurelien Jarno                          GPG: 1024D/F1BCDB73
aurelien@aurel32.net                 www.aurel32.net




Added tag(s) pending. Request was from Clint Adams <schizo@alioth.debian.org> to control@bugs.debian.org. (Thu, 22 Apr 2010 19:51:06 GMT) Full text and rfc822 format available.

Reply sent to Clint Adams <schizo@debian.org>:
You have taken responsibility. (Thu, 22 Apr 2010 23:06:03 GMT) Full text and rfc822 format available.

Notification sent to "Rémi Denis-Courmont" <remi@remlab.net>:
Bug acknowledged by developer. (Thu, 22 Apr 2010 23:06:04 GMT) Full text and rfc822 format available.

Message #53 received at 468801-close@bugs.debian.org (full text, mbox):

From: Clint Adams <schizo@debian.org>
To: 468801-close@bugs.debian.org
Subject: Bug#468801: fixed in eglibc 2.10.2-7
Date: Thu, 22 Apr 2010 23:02:48 +0000
Source: eglibc
Source-Version: 2.10.2-7

We believe that the bug you reported is fixed in the latest version of
eglibc, which is due to be installed in the Debian FTP archive:

eglibc-source_2.10.2-7_all.deb
  to main/e/eglibc/eglibc-source_2.10.2-7_all.deb
eglibc_2.10.2-7.diff.gz
  to main/e/eglibc/eglibc_2.10.2-7.diff.gz
eglibc_2.10.2-7.dsc
  to main/e/eglibc/eglibc_2.10.2-7.dsc
glibc-doc_2.10.2-7_all.deb
  to main/e/eglibc/glibc-doc_2.10.2-7_all.deb
locales_2.10.2-7_all.deb
  to main/e/eglibc/locales_2.10.2-7_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 468801@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Clint Adams <schizo@debian.org> (supplier of updated eglibc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 22 Apr 2010 09:38:27 -0400
Source: eglibc
Binary: libc-bin libc-dev-bin glibc-doc eglibc-source locales locales-all nscd libc6 libc6-dev libc6-dbg libc6-prof libc6-pic libc6-udeb libc6.1 libc6.1-dev libc6.1-dbg libc6.1-prof libc6.1-pic libc6.1-udeb libc0.3 libc0.3-dev libc0.3-dbg libc0.3-prof libc0.3-pic libc0.3-udeb libc0.1 libc0.1-dev libc0.1-dbg libc0.1-prof libc0.1-pic libc0.1-udeb libc6-i386 libc6-dev-i386 libc6-sparc64 libc6-dev-sparc64 libc6-s390x libc6-dev-s390x libc6-amd64 libc6-dev-amd64 libc6-powerpc libc6-dev-powerpc libc6-ppc64 libc6-dev-ppc64 libc6-mipsn32 libc6-dev-mipsn32 libc6-mips64 libc6-dev-mips64 libc0.1-i386 libc0.1-dev-i386 libc6-sparcv9b libc6-i686 libc6-xen libc0.1-i686 libc6.1-alphaev67 libnss-dns-udeb libnss-files-udeb
Architecture: source all
Version: 2.10.2-7
Distribution: unstable
Urgency: low
Maintainer: GNU Libc Maintainers <debian-glibc@lists.debian.org>
Changed-By: Clint Adams <schizo@debian.org>
Description: 
 eglibc-source - Embedded GNU C Library: sources
 glibc-doc  - Embedded GNU C Library: Documentation
 libc-bin   - Embedded GNU C Library: Binaries
 libc-dev-bin - Embedded GNU C Library: Development binaries
 libc0.1    - Embedded GNU C Library: Shared libraries
 libc0.1-dbg - Embedded GNU C Library: detached debugging symbols
 libc0.1-dev - Embedded GNU C Library: Development Libraries and Header Files
 libc0.1-dev-i386 - GNU C Library: 32bit development libraries for AMD64
 libc0.1-i386 - GNU C Library: 32bit shared libraries for AMD64
 libc0.1-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc0.1-pic - Embedded GNU C Library: PIC archive library
 libc0.1-prof - Embedded GNU C Library: Profiling Libraries
 libc0.1-udeb - Embedded GNU C Library: Shared libraries - udeb (udeb)
 libc0.3    - Embedded GNU C Library: Shared libraries
 libc0.3-dbg - Embedded GNU C Library: detached debugging symbols
 libc0.3-dev - Embedded GNU C Library: Development Libraries and Header Files
 libc0.3-pic - Embedded GNU C Library: PIC archive library
 libc0.3-prof - Embedded GNU C Library: Profiling Libraries
 libc0.3-udeb - Embedded GNU C Library: Shared libraries - udeb (udeb)
 libc6      - Embedded GNU C Library: Shared libraries
 libc6-amd64 - GNU C Library: 64bit Shared libraries for AMD64
 libc6-dbg  - Embedded GNU C Library: detached debugging symbols
 libc6-dev  - Embedded GNU C Library: Development Libraries and Header Files
 libc6-dev-amd64 - GNU C Library: 64bit Development Libraries for AMD64
 libc6-dev-i386 - GNU C Library: 32-bit development libraries for AMD64
 libc6-dev-mips64 - GNU C Library: 64bit Development Libraries for MIPS64
 libc6-dev-mipsn32 - GNU C Library: n32 Development Libraries for MIPS64
 libc6-dev-powerpc - GNU C Library: 32bit powerpc development libraries for ppc64
 libc6-dev-ppc64 - GNU C Library: 64bit Development Libraries for PowerPC64
 libc6-dev-s390x - GNU C Library: 64bit Development Libraries for IBM zSeries
 libc6-dev-sparc64 - GNU C Library: 64bit Development Libraries for UltraSPARC
 libc6-i386 - GNU C Library: 32-bit shared libraries for AMD64
 libc6-i686 - GNU C Library: Shared libraries [i686 optimized]
 libc6-mips64 - GNU C Library: 64bit Shared libraries for MIPS64
 libc6-mipsn32 - GNU C Library: n32 Shared libraries for MIPS64
 libc6-pic  - Embedded GNU C Library: PIC archive library
 libc6-powerpc - GNU C Library: 32bit powerpc shared libraries for ppc64
 libc6-ppc64 - GNU C Library: 64bit Shared libraries for PowerPC64
 libc6-prof - Embedded GNU C Library: Profiling Libraries
 libc6-s390x - GNU C Library: 64bit Shared libraries for IBM zSeries
 libc6-sparc64 - GNU C Library: 64bit Shared libraries for UltraSPARC
 libc6-sparcv9b - GNU C Library: Shared libraries [v9b optimized]
 libc6-udeb - Embedded GNU C Library: Shared libraries - udeb (udeb)
 libc6-xen  - GNU C Library: Shared libraries [Xen version]
 libc6.1    - Embedded GNU C Library: Shared libraries
 libc6.1-alphaev67 - GNU C Library: Shared libraries (EV67 optimized)
 libc6.1-dbg - Embedded GNU C Library: detached debugging symbols
 libc6.1-dev - Embedded GNU C Library: Development Libraries and Header Files
 libc6.1-pic - Embedded GNU C Library: PIC archive library
 libc6.1-prof - Embedded GNU C Library: Profiling Libraries
 libc6.1-udeb - Embedded GNU C Library: Shared libraries - udeb (udeb)
 libnss-dns-udeb - GNU C Library: NSS helper for DNS - udeb (udeb)
 libnss-files-udeb - GNU C Library: NSS helper for files - udeb (udeb)
 locales    - Embedded GNU C Library: National Language (locale) data [support]
 locales-all - Embedded GNU C Library: Precompiled locale data
 nscd       - Embedded GNU C Library: Name Service Cache Daemon
Closes: 468801 569517 569646 569701 570946 571639 571755
Changes: 
 eglibc (2.10.2-7) unstable; urgency=low
 .
   [ Samuel Thibault ]
   * patches/hurd-i386/local-pthread.diff: Refresh patch.
   * Update debian/testsuite-checking/expected-results-i486-gnu-libc.
   * patches/hurd-i386/cvs-setsid.diff: Update to git version.
   * patches/hurd-i386/local-locarchive.diff: New patch to fix installation of
     locales-all.
   * patches/hurd-i386/cvs-remove.diff: New upstream patch to fix remove()
     on directory on non-Linux ports.
 .
   [ Aurelien Jarno ]
   * debian/control.in/*: add ${misc:Depends} to all binary packages.
   * debian/*symbols*: simplify symbol files by using the new #PACKAGE#
     feature.
   * Bump to Standards-Version 3.8.4.
   * Update patches/alpha/submitted-sock_nonblock.diff to also fix
     SOCK_CLOEXEC.  Closes: #569646.
   * Update patches/hppa/submitted-sock_nonblock.diff to also fix
     SOCK_CLOEXEC.
   * Add patches/any/submitted-stat-issock.diff to define the S_ISSOCK
     macro starting with POSIX 2001.  Closes: #569517.
   * scripts.in/nsscheck.sh: remove non-breaking space.  Closes: #569701.
   * rules.d/debhelper.mk: remove obsolete comment.  Closes: #570946.
   * Replace patches/sparc/local-sparcv9-memchr.diff by
     patches/sparc/cvs-sparcv9-memchr.diff.
   * Add patches/sparc/submitted-msgrcv.diff to fix msgrcv() on sparc64,
     and with it fakeroot.
   * Add patches/any/submitted-nptl-invalid-td.patch to also catch
     uninitialized thread descriptors in INVALID_TD_P macro.  Closes:
     #571639.
   * Fix lang_ab field in es_CR locales.  Closes: #571755.
 .
   [ Petr Salinger]
   * kfreebsd/local-sysdeps.diff: update to revision 3034 (from glibc-bsd).
   * any/local-linuxthreads-stacksize.diff: New patch to restrict
     max stack size in threads
 .
   [ Clint Adams ]
   * Add any/local-gai-rfc1918-scope-global.patch.  closes: #468801.
Checksums-Sha1: 
 5b86d3b44dd1ddd177858c63bb9a9182b45e88f6 3408 eglibc_2.10.2-7.dsc
 a251d9ef426fae4ec7874e3fb2ab8a301f06ea37 814684 eglibc_2.10.2-7.diff.gz
 35b268da27955c1726dee65f955b043c1cec76da 1817268 glibc-doc_2.10.2-7_all.deb
 6c1adf012f2caf07135ce506b3ef8e6e3b5e65e6 10995720 eglibc-source_2.10.2-7_all.deb
 ca5dcbfbc7d401c9ce213af8be42544e07203015 4753568 locales_2.10.2-7_all.deb
Checksums-Sha256: 
 0f8bcb474fc496e15bfd53ff38656eaea51f08c25eeaffadd393b1e1ba9a1e58 3408 eglibc_2.10.2-7.dsc
 da547920fcf5cf612dd75de4f4f9784da32d6c6de7aea6726631347d398fc66f 814684 eglibc_2.10.2-7.diff.gz
 e2aeef09c3ea871bb7eebcd11fe88f1ad3688162b4151ef3b10c831921b5bd23 1817268 glibc-doc_2.10.2-7_all.deb
 08ef21a117a8c14ec6b872186c62d1bfc7d16b95a4cd06bf20b5b48bf6275286 10995720 eglibc-source_2.10.2-7_all.deb
 5ce513c3a71b0bf4475add8837fae3f60d996b3ee277b93f3733736974f9852d 4753568 locales_2.10.2-7_all.deb
Files: 
 e867ccd9307f65e7904d44a0811d280d 3408 libs required eglibc_2.10.2-7.dsc
 a82fced20a8f8020940a0d10ec01d8fe 814684 libs required eglibc_2.10.2-7.diff.gz
 1a9eed2c7959deefc9f119b367c58017 1817268 doc optional glibc-doc_2.10.2-7_all.deb
 84d502237908e83662244b5c49ae4869 10995720 devel optional eglibc-source_2.10.2-7_all.deb
 0b24e1861d1e21b750e00221d038d63f 4753568 localization standard locales_2.10.2-7_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Debian!
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=GGKQ
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Wed, 26 May 2010 07:31:28 GMT) Full text and rfc822 format available.

Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Fri Nov 16 06:51:20 2012; Machine Name: beach.debian.org

Debian Bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.