Your message dated Sat, 27 Nov 2004 15:48:52 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#150669: fixed in nwall 1.32-3 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 21 Jun 2002 21:30:56 +0000 >From [EMAIL PROTECTED] Fri Jun 21 16:30:56 2002 Return-path: <[EMAIL PROTECTED]> Received: from zork.zork.net [66.92.188.166] (mail) by master.debian.org with esmtp (Exim 3.12 1 (Debian)) id 17LVzb-00066u-00; Fri, 21 Jun 2002 16:30:55 -0500 Received: from nick by zork.zork.net with local (Exim 3.35 #1 (Debian)) id 17LVzX-0000jA-00; Fri, 21 Jun 2002 14:30:51 -0700 From: Nick Moffitt <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: nwall segfaults when lock is bogus X-Mailer: reportbug 1.50 Date: Fri, 21 Jun 2002 14:30:51 -0700 Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] Package: nwall Version: 1.31-1 Severity: important So I know i'm upstream, but this is the only bug tracker for nwall that exists! Basically, I had a lock that was owned by a nonexistant user (probably due to joey hess's mooix software, which we run on this box). 0 -rw-r----- 1 31262 tty 0 Jun 21 01:58 17 So nwall would segfault when it got to that lock. Removing it fixed things. -- System Information Debian Release: 3.0 Architecture: i386 Kernel: Linux zork 2.4.18 #2 Fri May 17 11:59:21 PDT 2002 i586 Locale: LANG=C, LC_CTYPE=C Versions of packages nwall depends on: ii libc6 2.2.5-6 GNU C Library: Shared libraries an ii libreadline4 4.2a-5 GNU readline and history libraries --------------------------------------- Received: (at 150669-close) by bugs.debian.org; 27 Nov 2004 20:53:36 +0000 >From [EMAIL PROTECTED] Sat Nov 27 12:53:36 2004 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CY9ZY-0005Pq-00; Sat, 27 Nov 2004 12:53:36 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1CY9Uy-0008Lf-00; Sat, 27 Nov 2004 15:48:52 -0500 From: Christoph Berg <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.54 $ Subject: Bug#150669: fixed in nwall 1.32-3 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Sat, 27 Nov 2004 15:48:52 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Source: nwall Source-Version: 1.32-3 We believe that the bug you reported is fixed in the latest version of nwall, which is due to be installed in the Debian FTP archive: nwall_1.32-3.diff.gz to pool/main/n/nwall/nwall_1.32-3.diff.gz nwall_1.32-3.dsc to pool/main/n/nwall/nwall_1.32-3.dsc nwall_1.32-3_i386.deb to pool/main/n/nwall/nwall_1.32-3_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Christoph Berg <[EMAIL PROTECTED]> (supplier of updated nwall package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sat, 27 Nov 2004 18:46:29 +0100 Source: nwall Binary: nwall Architecture: source i386 Version: 1.32-3 Distribution: unstable Urgency: low Maintainer: Debian QA Group <[EMAIL PROTECTED]> Changed-By: Christoph Berg <[EMAIL PROTECTED]> Description: nwall - version of wall that uses GNU readline Closes: 150669 Changes: nwall (1.32-3) unstable; urgency=low . * QA upload. * Fix segfault when encountering lockfiles from users without passwd entry (Closes: #150669). * Remove usr/sbin from debian/dirs. * Cosmetic debian/copyright fix. * Update watch file to version=2 and new upstream URL. * Cleanup debian/rules. * Bump Standards-Version; debhelper 4. Files: 269b10ad803b7344a71f666b712db76c 651 misc optional nwall_1.32-3.dsc ff38b6e48b070fd45811bead0f6c5f14 4704 misc optional nwall_1.32-3.diff.gz 149b6e351fc17d4c9d7508dc91c9c30d 9948 misc optional nwall_1.32-3_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) Comment: Joerg Jaspert <[EMAIL PROTECTED]> -- Debian Developer iD8DBQFBqOIZcV7WoH57iskRAnnxAJ9kLyRE3lXVgmxdVb+X24exOqnp5gCeIWH+ dzP6PfSkiKj1f9tXbjYrRS4= =5Zbl -----END PGP SIGNATURE-----