Bug#322410: marked as done (loudmouth: lm_connection_open_and_block() blocks infinitely if the server counldn't be reached.)

Debian Bug Tracking System owner at bugs.debian.org
Mon Aug 15 10:18:20 UTC 2005


Your message dated Mon, 15 Aug 2005 03:02:05 -0700
with message-id <E1E4bnB-0000Jt-00 at spohr.debian.org>
and subject line Bug#322410: fixed in loudmouth 1.0-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 10 Aug 2005 14:37:58 +0000
>From florian.ragwitz at s2004.tu-chemnitz.de Wed Aug 10 07:37:58 2005
Return-path: <florian.ragwitz at s2004.tu-chemnitz.de>
Received: from fry.debianforum.de (mail.debianforum.de) [213.239.213.245] 
	by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
	id 1E2riP-0002ND-00; Wed, 10 Aug 2005 07:37:58 -0700
Received: from localhost (localhost [127.0.0.1])
	by mail.debianforum.de (Postfix) with ESMTP id 85460B1C09E;
	Wed, 10 Aug 2005 16:37:49 +0200 (CEST)
Received: from mail.debianforum.de ([127.0.0.1])
	by localhost (mail.debianforum.de [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id 20618-09; Wed, 10 Aug 2005 16:37:44 +0200 (CEST)
Received: from localhost.localdomain (dsl-082-082-240-049.arcor-ip.net [82.82.240.49])
	(using TLSv1 with cipher AES256-SHA (256/256 bits))
	(No client certificate requested)
	by mail.debianforum.de (Postfix) with ESMTP id 15629B1C09B;
	Wed, 10 Aug 2005 16:37:44 +0200 (CEST)
Received: from rafl by localhost.localdomain with local (Exim 4.52)
	id 1E2rjU-0002Sx-HP; Wed, 10 Aug 2005 16:39:04 +0200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Florian Ragwitz <florian.ragwitz at s2004.tu-chemnitz.de>
To: Debian Bug Tracking System <submit at bugs.debian.org>
Subject: loudmouth: lm_connection_open_and_block() blocks infinitely if the server
 counldn't be reached.
X-Mailer: reportbug 3.15
Date: Wed, 10 Aug 2005 16:39:04 +0200
X-Debbugs-Cc: florian.ragwitz at s2004.tu-chemnitz.de
Message-Id: <E1E2rjU-0002Sx-HP at localhost.localdomain>
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at debianforum.de
Delivered-To: submit at bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
	X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02

Package: loudmouth
Severity: important

Hello,

lm_connection_open_and_block() blocks as long as the connection state is
LM_CONNECTION_STATE_OPENING, but this state will never reached if, for
example, the server refuses the connection. Therefor this operation will
block infinitely.


Regards,
Flo

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12.2
Locale: LANG=C, LC_CTYPE=de_DE at euro (charmap=ISO-8859-15)

---------------------------------------
Received: (at 322410-close) by bugs.debian.org; 15 Aug 2005 10:09:28 +0000
>From katie at spohr.debian.org Mon Aug 15 03:09:28 2005
Return-path: <katie at spohr.debian.org>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
	id 1E4bnB-0000Jt-00; Mon, 15 Aug 2005 03:02:05 -0700
From: Ross Burton <ross at debian.org>
To: 322410-close at bugs.debian.org
X-Katie: $Revision: 1.56 $
Subject: Bug#322410: fixed in loudmouth 1.0-1
Message-Id: <E1E4bnB-0000Jt-00 at spohr.debian.org>
Sender: Archive Administrator <katie at spohr.debian.org>
Date: Mon, 15 Aug 2005 03:02:05 -0700
Delivered-To: 322410-close at bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 3

Source: loudmouth
Source-Version: 1.0-1

We believe that the bug you reported is fixed in the latest version of
loudmouth, which is due to be installed in the Debian FTP archive:

libloudmouth1-0_1.0-1_i386.deb
  to pool/main/l/loudmouth/libloudmouth1-0_1.0-1_i386.deb
libloudmouth1-dev_1.0-1_i386.deb
  to pool/main/l/loudmouth/libloudmouth1-dev_1.0-1_i386.deb
loudmouth_1.0-1.diff.gz
  to pool/main/l/loudmouth/loudmouth_1.0-1.diff.gz
loudmouth_1.0-1.dsc
  to pool/main/l/loudmouth/loudmouth_1.0-1.dsc
loudmouth_1.0.orig.tar.gz
  to pool/main/l/loudmouth/loudmouth_1.0.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 322410 at bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ross Burton <ross at debian.org> (supplier of updated loudmouth package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster at debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 15 Aug 2005 10:45:58 +0100
Source: loudmouth
Binary: libloudmouth1-0 libloudmouth1-dev
Architecture: source i386
Version: 1.0-1
Distribution: unstable
Urgency: low
Maintainer: Ross Burton <ross at debian.org>
Changed-By: Ross Burton <ross at debian.org>
Description: 
 libloudmouth1-0 - Lightweight C Jabber library
 libloudmouth1-dev - Development files for Loudmouth Jabber library
Closes: 320718 320719 322410
Changes: 
 loudmouth (1.0-1) unstable; urgency=low
 .
   * New upstream release (closes: #322410, #320718, #320719)
Files: 
 c899165b39449ca466fbadddfa3aef47 1619 libs optional loudmouth_1.0-1.dsc
 ecf8a1c0bd69149a918ca0b03fde4e06 362633 libs optional loudmouth_1.0.orig.tar.gz
 ff0498dd5f90132157581dc4a0ad764d 3304 libs optional loudmouth_1.0-1.diff.gz
 0f047d99a8cd223cd1c2fa9e79c93d79 66284 libdevel optional libloudmouth1-dev_1.0-1_i386.deb
 5b1b80b3c06f88cb74530c2b3e476806 39582 libs optional libloudmouth1-0_1.0-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFDAGYjLQnkR9C0M98RAmzbAKDbtdee8E/2f/bUr07l7nWhvjRUkwCfRRR8
oxcf0yqsMF1RmWLWI+0gCXU=
=sbok
-----END PGP SIGNATURE-----





More information about the Pkg-gnome-maintainers mailing list