Your message dated Sat, 03 Dec 2005 07:32:03 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#335172: fixed in aptsh 0.0.5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 22 Oct 2005 09:52:29 +0000
>From [EMAIL PROTECTED] Sat Oct 22 02:52:29 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mxfep02.bredband.com [195.54.107.73] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1ETG3A-0007eO-00; Sat, 22 Oct 2005 02:52:29 -0700
Received: from janus ([82.182.47.93] [82.182.47.93])
          by mxfep02.bredband.com with ESMTP
          id <[EMAIL PROTECTED]>
          for <[EMAIL PROTECTED]>; Sat, 22 Oct 2005 11:51:53 +0200
Received: by janus (Postfix, from userid 1000)
        id 73853C5540; Sat, 22 Oct 2005 11:52:46 +0200 (CEST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Magnus Ihse <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: aptsh segfaults when run with "--help" as command line
X-Mailer: reportbug 3.17
Date: Sat, 22 Oct 2005 11:52:45 +0200
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: aptsh
Version: 0.0.4
Severity: normal

I usually start running new commands by calling them with --help.

janus:~# aptsh --help
Segmentation fault
janus:~# 

Ooops. :)

Excpected behaviour:
Either "invalid option" printed, or -- better -- a list of possible command
line options.

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (650, 'testing'), (600, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages aptsh depends on:
ii  apt [libapt-pkg-libc6.3-6-3.1 0.6.41     Advanced front-end for dpkg
ii  libc6                         2.3.5-6    GNU C Library: Shared libraries an
ii  libgcc1                       1:4.0.2-2  GCC support library
ii  libreadline4                  4.3-17     GNU readline and history libraries
ii  libstdc++6                    4.0.2-2    The GNU Standard C++ Library v3

aptsh recommends no packages.

-- no debconf information

---------------------------------------
Received: (at 335172-close) by bugs.debian.org; 3 Dec 2005 15:41:15 +0000
>From [EMAIL PROTECTED] Sat Dec 03 07:41:15 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 4.50)
        id 1EiZMp-0002wm-EL; Sat, 03 Dec 2005 07:32:03 -0800
From: Marcin Wrochniak <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.60 $
Subject: Bug#335172: fixed in aptsh 0.0.5
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sat, 03 Dec 2005 07:32:03 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 4

Source: aptsh
Source-Version: 0.0.5

We believe that the bug you reported is fixed in the latest version of
aptsh, which is due to be installed in the Debian FTP archive:

aptsh_0.0.5.dsc
  to pool/main/a/aptsh/aptsh_0.0.5.dsc
aptsh_0.0.5.tar.gz
  to pool/main/a/aptsh/aptsh_0.0.5.tar.gz
aptsh_0.0.5_i386.deb
  to pool/main/a/aptsh/aptsh_0.0.5_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Marcin Wrochniak <[EMAIL PROTECTED]> (supplier of updated aptsh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat,  3 Dec 2005 11:01:35 +0100
Source: aptsh
Binary: aptsh
Architecture: source i386
Version: 0.0.5
Distribution: unstable
Urgency: low
Maintainer: Marcin Wrochniak <[EMAIL PROTECTED]>
Changed-By: Marcin Wrochniak <[EMAIL PROTECTED]>
Description: 
 aptsh      - apt interactive shell
Closes: 333550 334109 334130 335172
Changes: 
 aptsh (0.0.5) unstable; urgency=low
 .
   * Aptsh used to crash when line was NULL (now exits). Closes: #333550.
   * Fixed PS1 in default configuration file which had been causing libreadline
     to mess up the screen when line was too long. Closes: #334130.
   * Added --help option and fixed bug with not recognized arguments.
     Closes: #335172.
   * Should build on 64-bit architectures now. Closes: #334109.
   * Changed libreadline4 to libreadline5.
Files: 
 57b8ba8e9704ea0228cef77c16a03892 538 admin optional aptsh_0.0.5.dsc
 353b1c3bb2a78a546535a6c1a653d140 131048 admin optional aptsh_0.0.5.tar.gz
 bb2444e5b552812aa60f8593219c3c0f 29808 admin optional aptsh_0.0.5_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDkbofMDatjqUaT90RAo7rAJ9cs4IExRMl6qNlZEZvSstjX4gISwCfaN6X
s+ZJsBYcLlK7mv+HKZglU/0=
=yvXG
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to