Your message dated Mon, 01 Mar 2010 22:09:42 +0000
with message-id <[email protected]>
and subject line Bug#567243: fixed in qwit 1.0+svn305-1
has caused the Debian Bug report #567243,
regarding qwit: found memory leak
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
567243: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567243
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: qwit
Version: 1.0+svn300-1
Severity: serious
Justification: required

After running for a while, the memory consumption 
of qwit process increases to a huge level. 

setting the update interval to a small value (say 30s)
helps reproduce the problem.

TIA.

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.32.6 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages qwit depends on:
ii  libc6                         2.10.2-5   Embedded GNU C Library: Shared lib
ii  libgcc1                       1:4.4.3-1  GCC support library
ii  libqt4-network                4:4.5.3-4  Qt 4 network module
ii  libqt4-xml                    4:4.5.3-4  Qt 4 XML module
ii  libqtcore4                    4:4.5.3-4  Qt 4 core module
ii  libqtgui4                     4:4.5.3-4  Qt 4 GUI module
ii  libstdc++6                    4.4.3-1    The GNU Standard C++ Library v3

qwit recommends no packages.

qwit suggests no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: qwit
Source-Version: 1.0+svn305-1

We believe that the bug you reported is fixed in the latest version of
qwit, which is due to be installed in the Debian FTP archive:

qwit_1.0+svn305-1.diff.gz
  to main/q/qwit/qwit_1.0+svn305-1.diff.gz
qwit_1.0+svn305-1.dsc
  to main/q/qwit/qwit_1.0+svn305-1.dsc
qwit_1.0+svn305-1_amd64.deb
  to main/q/qwit/qwit_1.0+svn305-1_amd64.deb
qwit_1.0+svn305.orig.tar.gz
  to main/q/qwit/qwit_1.0+svn305.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Carlos Galisteo <[email protected]> (supplier of updated qwit package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 11 Feb 2010 12:14:56 +0100
Source: qwit
Binary: qwit
Architecture: source amd64
Version: 1.0+svn305-1
Distribution: unstable
Urgency: low
Maintainer: Carlos Galisteo <[email protected]>
Changed-By: Carlos Galisteo <[email protected]>
Description: 
 qwit       - Lightweight desktop client for Twitter microblogging service
Closes: 567243
Changes: 
 qwit (1.0+svn305-1) unstable; urgency=low
 .
   * New upstream svn snapshot.
     - Memory leak fixed (Closes: #567243)
     - Layout of the user management dialog changed
     - No more notifications for 'more' button.
   * Updated Standards-Version to 3.8.4 No change needed.
Checksums-Sha1: 
 245d59fba922285957b663a6330c7b80b99556b6 1039 qwit_1.0+svn305-1.dsc
 9f420c7237a262ab354bc0b575cddee8b182f05d 227389 qwit_1.0+svn305.orig.tar.gz
 349f0ba57c3666b259003147c336236ed663b6e4 2892 qwit_1.0+svn305-1.diff.gz
 dc3b830b7d7e788ef5ababdc71330fc48191975c 339808 qwit_1.0+svn305-1_amd64.deb
Checksums-Sha256: 
 15be1a6020c68c27d3e2530c12b41afc488b5e25c25870447fbf2b6d96d05809 1039 
qwit_1.0+svn305-1.dsc
 526ac6f8a197f76589d507da91a60ae6504263a064fddf27b715caf84712542d 227389 
qwit_1.0+svn305.orig.tar.gz
 c4024bf59428b8ce65def2d85ee273f8d9de381337ff842fa786ae604d925dfc 2892 
qwit_1.0+svn305-1.diff.gz
 3fec96eeba5d971388e1996e062c7237d31005537121e8156d3d7bb88353cea6 339808 
qwit_1.0+svn305-1_amd64.deb
Files: 
 a7b408b797f82f87d9a59829c47c9ef9 1039 net extra qwit_1.0+svn305-1.dsc
 7803c4d139fdee23020c38a321937d5d 227389 net extra qwit_1.0+svn305.orig.tar.gz
 8b6a9bd53c04c52f892c6946d0b7e445 2892 net extra qwit_1.0+svn305-1.diff.gz
 22edf797d3f5face88d06e00dec9b1a9 339808 net extra qwit_1.0+svn305-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkuMNHAACgkQ2XA5inpabMceIQCgnPTCf3hDdOvjnuKI+MCeN6db
5zsAn0kRlxS49HHaazOoJ/huXSSrAjgm
=ENvw
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to