Your message dated Sun, 08 May 2005 19:02:05 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294801: fixed in mpg123 0.59r-20
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 11 Feb 2005 18:06:04 +0000
>From [EMAIL PROTECTED] Fri Feb 11 10:06:04 2005
Return-path: <[EMAIL PROTECTED]>
Received: from orval.sprint.ca [209.5.194.98]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CzfB6-0000Lc-00; Fri, 11 Feb 2005 10:06:04 -0800
Received: from engels.commie ([149.99.203.230]) by orval.sprint.ca
(InterMail vM.5.01.02.00 201-253-122-103-101-20001108) with ESMTP
id <[EMAIL PROTECTED]>;
Fri, 11 Feb 2005 13:06:02 -0500
Received: from jjazz by engels.commie with local (Exim 4.34)
id 1CzfAw-0003sn-Ty; Fri, 11 Feb 2005 13:05:55 -0500
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: "Jim W. Jaszewski" <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: mpg123: "URL exceeds max. length" error on normal URL
X-Mailer: reportbug 3.2
Date: Fri, 11 Feb 2005 13:05:53 -0500
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.6 required=4.0 tests=BAYES_00,HAS_PACKAGE,
WEIRD_PORT autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
Package: mpg123
Version: 0.59r-19
Severity: normal
I have no idea what's happening with this one. This is the only URL I
access which has ever given this particular error, and it used to work
just fine previously. For all I know, it'll work just fine on other
machines. I believe this problem has been ongoing for months, so it's
not an intermittent thing.
The URL: http://war.str3am.com:7980/ (KHSU 90.5FM Humboldt SU radio)
Note that this URL worx just fine with mp3blaster.
-- System Information:
Debian Release: 3.1
APT prefers testing
APT policy: (998, 'testing'), (99, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.4.20
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
Versions of packages mpg123 depends on:
ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an
-- no debconf information
---------------------------------------
Received: (at 294801-close) by bugs.debian.org; 8 May 2005 23:15:31 +0000
>From [EMAIL PROTECTED] Sun May 08 16:15:31 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DUuzj-0007gk-00; Sun, 08 May 2005 16:15:31 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DUumj-00030x-00; Sun, 08 May 2005 19:02:05 -0400
From: Daniel Kobras <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#294801: fixed in mpg123 0.59r-20
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sun, 08 May 2005 19:02:05 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
Source: mpg123
Source-Version: 0.59r-20
We believe that the bug you reported is fixed in the latest version of
mpg123, which is due to be installed in the Debian FTP archive:
mpg123-esd_0.59r-20_i386.deb
to pool/non-free/m/mpg123/mpg123-esd_0.59r-20_i386.deb
mpg123-esd_0.59r-20_powerpc.deb
to pool/non-free/m/mpg123/mpg123-esd_0.59r-20_powerpc.deb
mpg123-nas_0.59r-20_i386.deb
to pool/non-free/m/mpg123/mpg123-nas_0.59r-20_i386.deb
mpg123-oss-3dnow_0.59r-20_i386.deb
to pool/non-free/m/mpg123/mpg123-oss-3dnow_0.59r-20_i386.deb
mpg123-oss-i486_0.59r-20_i386.deb
to pool/non-free/m/mpg123/mpg123-oss-i486_0.59r-20_i386.deb
mpg123_0.59r-20.diff.gz
to pool/non-free/m/mpg123/mpg123_0.59r-20.diff.gz
mpg123_0.59r-20.dsc
to pool/non-free/m/mpg123/mpg123_0.59r-20.dsc
mpg123_0.59r-20_arm.deb
to pool/non-free/m/mpg123/mpg123_0.59r-20_arm.deb
mpg123_0.59r-20_hppa.deb
to pool/non-free/m/mpg123/mpg123_0.59r-20_hppa.deb
mpg123_0.59r-20_i386.deb
to pool/non-free/m/mpg123/mpg123_0.59r-20_i386.deb
mpg123_0.59r-20_m68k.deb
to pool/non-free/m/mpg123/mpg123_0.59r-20_m68k.deb
mpg123_0.59r-20_powerpc.deb
to pool/non-free/m/mpg123/mpg123_0.59r-20_powerpc.deb
mpg123_0.59r-20_sparc.deb
to pool/non-free/m/mpg123/mpg123_0.59r-20_sparc.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Daniel Kobras <[EMAIL PROTECTED]> (supplier of updated mpg123 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 8 May 2005 19:37:18 +0200
Source: mpg123
Binary: mpg123-esd mpg123-oss-3dnow mpg123-nas mpg123-oss-i486 mpg123
Architecture: arm hppa i386 m68k powerpc source sparc
Version: 0.59r-20
Distribution: unstable
Urgency: high
Maintainer: Daniel Kobras <[EMAIL PROTECTED]>
Changed-By: Daniel Kobras <[EMAIL PROTECTED]>
Description:
mpg123 - MPEG layer 1/2/3 audio player
Closes: 294801
Changes:
mpg123 (0.59r-20) unstable; urgency=high
.
* httpget.c: Fix integer overflows in http parser, introduced by
security patch for CAN-2004-0982.
* httpget.c: Ensure minimum size of receive buffer to fix regression
in 0.59r-18, caused by patch for CAN-2004-0982. Closes: #294801
Files:
004855f0342dcbca9476087068f6dbd6 101672 non-free/sound optional
mpg123_0.59r-20_hppa.deb
18e5fedc4b7bee37e5e63231343402ce 90280 non-free/sound optional
mpg123-oss-3dnow_0.59r-20_i386.deb
241ecddba56d9cbd3839077529a6f779 41329 non-free/sound optional
mpg123_0.59r-20.diff.gz
4a685c5426c156b34a1d4c49233f09d4 90052 non-free/sound optional
mpg123-nas_0.59r-20_i386.deb
5bc03bb7cb5fb06b3004ce53c8176477 80228 non-free/sound optional
mpg123_0.59r-20_m68k.deb
5c2b0bc420f87e65c16bb9cc4d43d45b 97966 non-free/sound optional
mpg123-esd_0.59r-20_powerpc.deb
884d549263ef7510f3b8b61f65954f82 93734 non-free/sound optional
mpg123-oss-i486_0.59r-20_i386.deb
a4870432ae051bdd3c02154305e4950f 87066 non-free/sound optional
mpg123_0.59r-20_i386.deb
c542b9c2ad109634f17ee2a57771ed99 91496 non-free/sound optional
mpg123_0.59r-20_sparc.deb
ce3d17c02c904b54233163643a7c2dd2 87116 non-free/sound optional
mpg123-esd_0.59r-20_i386.deb
7d9d4e84faf16f7578ebd8b901a30543 736 non-free/sound optional
mpg123_0.59r-20.dsc
f8f018268fc6740196d5c6fc559e39f5 96468 non-free/sound optional
mpg123_0.59r-20_powerpc.deb
fa595dfc86dc2a6352133be06934ae51 101930 non-free/sound optional
mpg123_0.59r-20_arm.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Darwin)
iD8DBQFCfpcupOKIA4m/fisRAmTJAKCzZvW3HHyaWrAnBEtUxyAu1BRS+wCfW2ZA
mjRwolX1OWPbuNMwknZdZVI=
=GNTQ
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]