Your message dated Wed, 16 Jun 2010 06:50:33 +0000
with message-id <[email protected]>
and subject line Bug#585506: fixed in msva-perl 0.3-1
has caused the Debian Bug report #585506,
regarding subprocesses of msva-perl have the SIGCHLD action set to SIG_IGN 
(ignore)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
585506: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=585506
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: msva-perl
Version: 0.2-2
Severity: normal

msva-perl needs to fiddle with the SIGCHLD handler to do its thing.
That's fine

However, when it spawns a subprocess, that subprocess inherits
msva-perl's choice to ignore SIGCHLD, which turns out to be
problematic for some commonly-spawned subprocesses.  For example,
seahorse-agent (see #585505) and gnome-session (see #585504) are both
buggy if they inherit a SIG_IGN action for their SIGCHLD handler.

Upstream's msva-perl contains a fix for this bug (revision
ee8c2b6fdb4c in the msva-perl git repo), which isn't yet released, but
probably needs to be available if people are going to use msva-perl
with a standard gnome desktop environment.

             --dkg

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing'), (200, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages msva-perl depends on:
ii  libconvert-asn1-perl          0.22-1     Perl module for encoding and decod
ii  libcrypt-x509-perl            0.40-1     Parse X.509 certificates with Perl
ii  libhttp-server-simple-perl    0.43-1     simple stand-alone HTTP server
ii  libjson-perl                  2.21-1     Perl module to parse and convert t
ii  libnet-server-perl            0.97-1     An extensible, general perl server
ii  monkeysphere                  0.31~pre-1 leverage the OpenPGP web of trust 
ii  perl-modules [libparent-perl] 5.10.1-12  Core Perl modules

msva-perl recommends no packages.

msva-perl suggests no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: msva-perl
Source-Version: 0.3-1

We believe that the bug you reported is fixed in the latest version of
msva-perl, which is due to be installed in the Debian FTP archive:

msva-perl_0.3-1.debian.tar.gz
  to main/m/msva-perl/msva-perl_0.3-1.debian.tar.gz
msva-perl_0.3-1.dsc
  to main/m/msva-perl/msva-perl_0.3-1.dsc
msva-perl_0.3-1_all.deb
  to main/m/msva-perl/msva-perl_0.3-1_all.deb
msva-perl_0.3.orig.tar.gz
  to main/m/msva-perl/msva-perl_0.3.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Kahn Gillmor <[email protected]> (supplier of updated msva-perl 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 16 Jun 2010 02:32:42 -0400
Source: msva-perl
Binary: msva-perl
Architecture: source all
Version: 0.3-1
Distribution: unstable
Urgency: low
Maintainer: Daniel Kahn Gillmor <[email protected]>
Changed-By: Daniel Kahn Gillmor <[email protected]>
Description: 
 msva-perl  - Cryptographic identity validation agent (Perl implementation)
Closes: 585506
Changes: 
 msva-perl (0.3-1) unstable; urgency=low
 .
   * New Upstream Release:
    - packaging re-organization
    - restore default SIGCHLD handler for subprocesses (Closes: #585506)
Checksums-Sha1: 
 4b8302be0401ab321133e5469ff77cb2d2480b15 1749 msva-perl_0.3-1.dsc
 f3a79238a3ee8433191ec8fb570c88825f6e2bd2 21879 msva-perl_0.3.orig.tar.gz
 2afb4ab2f12fbea8714b2c05ced86e5b14ae575d 1861 msva-perl_0.3-1.debian.tar.gz
 a7de4fec4813b0fe4d4e281bd660ce328d0ea996 15098 msva-perl_0.3-1_all.deb
Checksums-Sha256: 
 f16320bbe015ad65abafbd87067abe0c224fa31e31967a175df8ff0c0bc6fbd0 1749 
msva-perl_0.3-1.dsc
 4457810e9c475591cfe225032fe2e6afd432d94a5d8ddf7439c73c8f898f9224 21879 
msva-perl_0.3.orig.tar.gz
 89dfd66b5ece5384c9cf1ac5cf2d874f822fa1d525e6c0e680b95aa0f7139ac7 1861 
msva-perl_0.3-1.debian.tar.gz
 175165d34c846eb275027f8711a484ff032cd3dd1216dcb549b9a70420256229 15098 
msva-perl_0.3-1_all.deb
Files: 
 61c0341d1f9cf192e83ce58a416d53d4 1749 net extra msva-perl_0.3-1.dsc
 21ae9efbb2f4bbe9800ecc1ad3413a6e 21879 net extra msva-perl_0.3.orig.tar.gz
 ff31dda1992191e43871ec8a0e5401f8 1861 net extra msva-perl_0.3-1.debian.tar.gz
 6318a899a7bd61a2add5a90558a476bf 15098 net extra msva-perl_0.3-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=8Bl5
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to