Your message dated Wed, 03 Oct 2007 23:17:05 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#361568: fixed in libpam-chroot 0.9-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: libpam-chroot
Version: 0.9-1

Your package fails to build with GCC 4.2.  Version 4.2 has not been
released yet but I'm building with a snapshot in order to find errors
and give people an advance warning.  The bug below is in your package
and not because I'm using a snapshot of the compiler so please take a
look at it.  You can reproduce this with the gcc-snapshot package.


> Automatic build of libpam-chroot_0.9-1 on em64t by sbuild/amd64 1.112
...
> make[1]: Entering directory `/build/tbm/libpam-chroot-0.9'
> gcc -fPIC -O2 -Wall -Werror -pedantic -I.  -c -o pam_chroot.o pam_chroot.c
> cc1: warnings being treated as errors
> pam_chroot.c: In function '_pam_get_groups':
> pam_chroot.c:294: warning: the address of 'scratch', will always evaluate as 
> 'true'
> make[1]: *** [pam_chroot.o] Error 1

-- 
Martin Michlmayr
http://www.cyrius.com/


--- End Message ---
--- Begin Message ---
Source: libpam-chroot
Source-Version: 0.9-3

We believe that the bug you reported is fixed in the latest version of
libpam-chroot, which is due to be installed in the Debian FTP archive:

libpam-chroot_0.9-3.diff.gz
  to pool/main/libp/libpam-chroot/libpam-chroot_0.9-3.diff.gz
libpam-chroot_0.9-3.dsc
  to pool/main/libp/libpam-chroot/libpam-chroot_0.9-3.dsc
libpam-chroot_0.9-3_i386.deb
  to pool/main/libp/libpam-chroot/libpam-chroot_0.9-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Javier Fernandez-Sanguino Pen~a <[EMAIL PROTECTED]> (supplier of updated 
libpam-chroot package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 04 Oct 2007 00:59:53 +0200
Source: libpam-chroot
Binary: libpam-chroot
Architecture: source i386
Version: 0.9-3
Distribution: unstable
Urgency: medium
Maintainer: Javier Fernandez-Sanguino Pen~a <[EMAIL PROTECTED]>
Changed-By: Javier Fernandez-Sanguino Pen~a <[EMAIL PROTECTED]>
Description: 
 libpam-chroot - Chroot Pluggable Authentication Module for PAM
Closes: 361568
Changes: 
 libpam-chroot (0.9-3) unstable; urgency=medium
 .
   * This package builds fine with Gcc 4.2 (Closes: #361568)
   * Replace x_strdup() with strdup() in pam_chroot.c
   * Use debian compatibility version 5
Files: 
 c4a8f582fad67c0da04b9f360def3307 609 devel optional libpam-chroot_0.9-3.dsc
 5b49f55a77b374576fc50919c6cc47fd 8652 devel optional 
libpam-chroot_0.9-3.diff.gz
 d9d2a6d3aed68d49b4cee7d600ae0d9b 18072 devel optional 
libpam-chroot_0.9-3_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHBCCysandgtyBSwkRAvkwAJ0RWul0RNX15YwdA4JFeg1hcqyLyQCeLYY9
ApfW8Y56jqf0d2Vq+ILJEcU=
=b5SH
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to