Your message dated Sat, 03 Dec 2005 07:32:03 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#333550: fixed in aptsh 0.0.5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 12 Oct 2005 14:51:25 +0000
>From [EMAIL PROTECTED] Wed Oct 12 07:51:25 2005
Return-path: <[EMAIL PROTECTED]>
Received: from ms-smtp-02.rdc-kc.rr.com [24.94.166.122] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1EPhwz-0004ZY-00; Wed, 12 Oct 2005 07:51:25 -0700
Received: from Odin.asgard (CPE-24-208-125-172.kc.res.rr.com [24.208.125.172])
        by ms-smtp-02.rdc-kc.rr.com (8.12.10/8.12.7) with ESMTP id 
j9CEoTdu005486
        for <[EMAIL PROTECTED]>; Wed, 12 Oct 2005 09:50:29 -0500 (CDT)
Received: from Balder.asgard (Balder.asgard [192.168.1.13])
        by Odin.asgard (Postfix) with ESMTP id 7C8092C2A38;
        Wed, 12 Oct 2005 09:51:20 -0500 (CDT)
Received: from dennis by Balder.asgard with local (Exim 4.54)
        id 1EPhwu-0002JS-CO; Wed, 12 Oct 2005 09:51:20 -0500
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Dennis Hostetler <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: aptsh segfaults when exited with control-d
X-Mailer: reportbug 3.17
Date: Wed, 12 Oct 2005 09:51:20 -0500
Message-Id: <[EMAIL PROTECTED]>
X-Virus-Scanned: Symantec AntiVirus Scan Engine
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: aptsh
Version: 0.0.4
Severity: normal


When exiting aptsh with control-d the app segfaults.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-k7
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages aptsh depends on:
ii  apt [libapt-pkg-libc6.3-6-3.1 0.6.41     Advanced front-end for dpkg
ii  libc6                         2.3.5-6    GNU C Library: Shared libraries an
ii  libgcc1                       1:4.0.2-2  GCC support library
ii  libreadline4                  4.3-17     GNU readline and history libraries
ii  libstdc++6                    4.0.2-2    The GNU Standard C++ Library v3

aptsh recommends no packages.

-- no debconf information

---------------------------------------
Received: (at 333550-close) by bugs.debian.org; 3 Dec 2005 15:41:14 +0000
>From [EMAIL PROTECTED] Sat Dec 03 07:41:14 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 4.50)
        id 1EiZMp-0002wg-Bx; Sat, 03 Dec 2005 07:32:03 -0800
From: Marcin Wrochniak <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.60 $
Subject: Bug#333550: fixed in aptsh 0.0.5
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sat, 03 Dec 2005 07:32:03 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 3

Source: aptsh
Source-Version: 0.0.5

We believe that the bug you reported is fixed in the latest version of
aptsh, which is due to be installed in the Debian FTP archive:

aptsh_0.0.5.dsc
  to pool/main/a/aptsh/aptsh_0.0.5.dsc
aptsh_0.0.5.tar.gz
  to pool/main/a/aptsh/aptsh_0.0.5.tar.gz
aptsh_0.0.5_i386.deb
  to pool/main/a/aptsh/aptsh_0.0.5_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Marcin Wrochniak <[EMAIL PROTECTED]> (supplier of updated aptsh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat,  3 Dec 2005 11:01:35 +0100
Source: aptsh
Binary: aptsh
Architecture: source i386
Version: 0.0.5
Distribution: unstable
Urgency: low
Maintainer: Marcin Wrochniak <[EMAIL PROTECTED]>
Changed-By: Marcin Wrochniak <[EMAIL PROTECTED]>
Description: 
 aptsh      - apt interactive shell
Closes: 333550 334109 334130 335172
Changes: 
 aptsh (0.0.5) unstable; urgency=low
 .
   * Aptsh used to crash when line was NULL (now exits). Closes: #333550.
   * Fixed PS1 in default configuration file which had been causing libreadline
     to mess up the screen when line was too long. Closes: #334130.
   * Added --help option and fixed bug with not recognized arguments.
     Closes: #335172.
   * Should build on 64-bit architectures now. Closes: #334109.
   * Changed libreadline4 to libreadline5.
Files: 
 57b8ba8e9704ea0228cef77c16a03892 538 admin optional aptsh_0.0.5.dsc
 353b1c3bb2a78a546535a6c1a653d140 131048 admin optional aptsh_0.0.5.tar.gz
 bb2444e5b552812aa60f8593219c3c0f 29808 admin optional aptsh_0.0.5_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDkbofMDatjqUaT90RAo7rAJ9cs4IExRMl6qNlZEZvSstjX4gISwCfaN6X
s+ZJsBYcLlK7mv+HKZglU/0=
=yvXG
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to