Your message dated Sun, 16 Oct 2005 06:02:07 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#315120: fixed in apt-spy 3.1-14
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 20 Jun 2005 17:36:17 +0000
>From [EMAIL PROTECTED] Mon Jun 20 10:36:17 2005
Return-path: <[EMAIL PROTECTED]>
Received: from cpe-066-026-083-113.nc.res.rr.com (max.bungled.net) 
[66.26.83.113] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DkQC1-0001NV-00; Mon, 20 Jun 2005 10:36:17 -0700
Received: by max.bungled.net (Postfix, from userid 1000)
        id 33398900CF; Mon, 20 Jun 2005 13:36:16 -0400 (EDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Nathan Conrad <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: apt-spy: segfault with updated mirror list
X-Mailer: reportbug 3.12
Date: Mon, 20 Jun 2005 13:36:15 -0400
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: apt-spy
Version: 3.1-13
Severity: important

Apt-spy segfaults when searching for a fast mirror.

Reproducable on both i386 and PPC:

1) Install apt-spy
2) apt-spy update
3) apt-spy -d testing -o /tmp/test.out
4) apt-spy segfaults
-Nathan

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing'), (1, 'experimental')
Architecture: powerpc (ppc)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.25-ben1
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages apt-spy depends on:
ii  libc6                       2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libcurl3                    7.13.2-2     Multi-protocol file transfer libra

-- no debconf information

---------------------------------------
Received: (at 315120-close) by bugs.debian.org; 16 Oct 2005 13:08:17 +0000
>From [EMAIL PROTECTED] Sun Oct 16 06:08:17 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1ER89P-0005lM-00; Sun, 16 Oct 2005 06:02:07 -0700
From: Stephen Stafford <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#315120: fixed in apt-spy 3.1-14
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sun, 16 Oct 2005 06:02:07 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: apt-spy
Source-Version: 3.1-14

We believe that the bug you reported is fixed in the latest version of
apt-spy, which is due to be installed in the Debian FTP archive:

apt-spy_3.1-14.diff.gz
  to pool/main/a/apt-spy/apt-spy_3.1-14.diff.gz
apt-spy_3.1-14.dsc
  to pool/main/a/apt-spy/apt-spy_3.1-14.dsc
apt-spy_3.1-14_i386.deb
  to pool/main/a/apt-spy/apt-spy_3.1-14_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Stephen Stafford <[EMAIL PROTECTED]> (supplier of updated apt-spy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 16 Oct 2005 12:42:22 +0000
Source: apt-spy
Binary: apt-spy
Architecture: source i386
Version: 3.1-14
Distribution: unstable
Urgency: low
Maintainer: Stephen Stafford <[EMAIL PROTECTED]>
Changed-By: Stephen Stafford <[EMAIL PROTECTED]>
Description: 
 apt-spy    - writes a sources.list file based on bandwidth tests
Closes: 315120 317585 317586 317588 317589 317593
Changes: 
 apt-spy (3.1-14) unstable; urgency=low
 .
   [ ssta ]
   * Change build-depends on libcurl3-dev to libcurl3-openssl-dev
   * Apply some patches from Justin Pryzby (Thanks Justin, apologies it's
     taken me so long!)
     - Patch to fix the mirror file screwup which caused apy-spy to segfault
       every time. It removes some arbitrary limits. (Closes: #315120 #317591)
     - Change the malloc of country_file so it's not mallocing its own length
       (Closes: #317585)
     - Apply patch which uses sprintf instead of strncat in file.c
       (Closes: #317589)
     - Apply patch to fix small memory leak (Closes: #317593)
     - s/LICENSE/COPYRIGHT/ in *.c  (Closes: #317588)
     - add a break statement to write_top() (Closes: #317586)
 .
   [ Stephen Stafford ]
   *
Files: 
 a8b43929c3984137e04e15dde12944c7 583 admin optional apt-spy_3.1-14.dsc
 ff44795fc807c7314cf50d01aa00f6b1 23405 admin optional apt-spy_3.1-14.diff.gz
 7dd766a5f5c80e42f5315e9ed15bc1a0 28276 admin optional apt-spy_3.1-14_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDUkxPFwmY7Xa4pD0RAi2UAKCLM75cT+l1Q1Sy+RJ3/DIiUIwffgCeKRw4
oQ27hPOgDkqqUSHHZZiCBWo=
=C8Oi
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to