Your message dated Thu, 10 Nov 2005 13:32:25 -0800 with message-id <[EMAIL PROTECTED]> and subject line Bug#338014: fixed in lsh-utils 2.0.1-5 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 7 Nov 2005 19:54:10 +0000 >From [EMAIL PROTECTED] Mon Nov 07 11:54:10 2005 Return-path: <[EMAIL PROTECTED]> Received: from bache.ece.cmu.edu [128.2.129.23] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1EZD4E-0006Ga-00; Mon, 07 Nov 2005 11:54:10 -0800 Received: from berlin.pdl.cmu.edu (BERLIN.PDL.CMU.EDU [128.2.134.111]) by bache.ece.cmu.edu (Postfix) with ESMTP id 29337BF; Mon, 7 Nov 2005 14:54:09 -0500 (EST) Received: from cfry by berlin.pdl.cmu.edu with local (Exim 4.54) id 1EZD4C-0007lD-Qp; Mon, 07 Nov 2005 14:54:08 -0500 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Charles Fry <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: lsh-utils: lcp depends on lsh X-Mailer: reportbug 3.17 Date: Mon, 07 Nov 2005 14:54:08 -0500 Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 Package: lsh-utils Version: 2.0.1-4.2 Severity: serious lcp needs lsh in order to properly execute, which dependency should be explicitely indicated in debian/control. Charles -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (900, 'testing'), (800, 'stable'), (70, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.8-2-386 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages lsh-utils depends on: ii libc6 2.3.5-6 GNU C Library: Shared libraries an ii libgmp3c2 4.1.4-10 Multiprecision arithmetic library ii libncurses5 5.4-9 Shared libraries for terminal hand ii liboop4 1.0-3 Event loop management library ii libpam0g 0.79-3 Pluggable Authentication Modules l ii libreadline5 5.0-11 GNU readline and history libraries ii libwrap0 7.6.dbs-8 Wietse Venema's TCP wrappers libra ii libxau6 6.8.2.dfsg.1-7 X Authentication library ii zlib1g 1:1.2.3-4 compression library - runtime Versions of packages lsh-utils recommends: pn lsh-client <none> (no description available) pn lsh-server <none> (no description available) -- no debconf information --------------------------------------- Received: (at 338014-close) by bugs.debian.org; 10 Nov 2005 21:39:42 +0000 >From [EMAIL PROTECTED] Thu Nov 10 13:39:42 2005 Return-path: <[EMAIL PROTECTED]> Received: from katie by spohr.debian.org with local (Exim 4.50) id 1EaK1x-0006aq-Rp; Thu, 10 Nov 2005 13:32:25 -0800 From: Stefan Pfetzing <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.56 $ Subject: Bug#338014: fixed in lsh-utils 2.0.1-5 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Thu, 10 Nov 2005 13:32:25 -0800 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-CrossAssassin-Score: 3 Source: lsh-utils Source-Version: 2.0.1-5 We believe that the bug you reported is fixed in the latest version of lsh-utils, which is due to be installed in the Debian FTP archive: lsh-client_2.0.1-5_i386.deb to pool/main/l/lsh-utils/lsh-client_2.0.1-5_i386.deb lsh-server_2.0.1-5_i386.deb to pool/main/l/lsh-utils/lsh-server_2.0.1-5_i386.deb lsh-utils-doc_2.0.1-5_all.deb to pool/main/l/lsh-utils/lsh-utils-doc_2.0.1-5_all.deb lsh-utils_2.0.1-5.diff.gz to pool/main/l/lsh-utils/lsh-utils_2.0.1-5.diff.gz lsh-utils_2.0.1-5.dsc to pool/main/l/lsh-utils/lsh-utils_2.0.1-5.dsc lsh-utils_2.0.1-5_i386.deb to pool/main/l/lsh-utils/lsh-utils_2.0.1-5_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Stefan Pfetzing <[EMAIL PROTECTED]> (supplier of updated lsh-utils package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Thu, 10 Nov 2005 21:36:44 +0100 Source: lsh-utils Binary: lsh-utils lsh-client lsh-utils-doc lsh-server Architecture: source all i386 Version: 2.0.1-5 Distribution: unstable Urgency: low Maintainer: Simon Law <[EMAIL PROTECTED]> Changed-By: Stefan Pfetzing <[EMAIL PROTECTED]> Description: lsh-client - Secure Shell v2 (SSH2) protocol client lsh-server - Secure Shell v2 (SSH2) protocol server lsh-utils - Secure Shell v2 (SSH2) protocol utilities lsh-utils-doc - Secure Shell v2 (SSH2) client / server / utilities documentation Closes: 211317 271911 300496 304697 312617 313975 318211 319933 320554 326328 326329 332012 337017 338014 338015 338017 338104 338170 Changes: lsh-utils (2.0.1-5) unstable; urgency=low . * Make lsh-utils depend on lsh-client. (Closes: Bug#338014) * Fix lshg to look for lshc instead of lsh. (Closes: Bug#320554) * Fix lcp to look for lshc instead of lsh. (Closes: Bug#338015) * Add lcp manpage. (Closes: Bug#338017) * Clarify package description. lsh should be considered stable now. (Closes: Bug#211317) * Update Russian debconf translation. (Closes: Bug#338170) * Update French debconf translation. (Closes: Bug#338104) * Update Danish debconf translation. (Closes: Bug#337017) * Change guile1.4-slib to guile-1.6 since slib.scm is included with guile-1.6-libs, and we need the scheme interpreter. * Add myself to the uploaders list. * Approve NMUs. (Closes: Bug#300496,Bug#318211,Bug#326328,Bug#326329,Bug#332012) (Closes: Bug#271911,Bug#312617,Bug#313975,Bug#304697,Bug#319933) Files: 4c3557efa435b762637f53e3821c6ab4 861 net extra lsh-utils_2.0.1-5.dsc ff16e1aed99dfd0640caac374cff2479 82070 net extra lsh-utils_2.0.1-5.diff.gz 531a38913513c778a966b6c2dd41c626 167036 doc extra lsh-utils-doc_2.0.1-5_all.deb bc866ec5211511a762ad4828f8bbed41 760214 net extra lsh-utils_2.0.1-5_i386.deb 2faf6760b191df19a35b47c92d68d667 272394 net extra lsh-server_2.0.1-5_i386.deb 5943f9203f180729e5df8043a277fd42 298172 net extra lsh-client_2.0.1-5_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDc7Fri50xCpfDmMsRAnDWAKDrhUwLM7rkXtNE8GnkMsQFEaI11wCg5ez3 4O4LqdsMXQfmt++4IN9ff4Q= =Ucyf -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]