Your message dated Thu, 31 Mar 2005 09:02:18 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#299705: fixed in crack-attack 1.1.12-r1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 15 Mar 2005 22:42:21 +0000
>From [EMAIL PROTECTED] Tue Mar 15 14:42:21 2005
Return-path: <[EMAIL PROTECTED]>
Received: from postman4.arcor-online.net (postman.arcor.de) [151.189.20.158] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DBKk0-0000e1-00; Tue, 15 Mar 2005 14:42:20 -0800
Received: from littlefarm (p54B826C5.dip0.t-ipconnect.de [84.184.38.197])
        (authenticated bits=0)
        by postman.arcor.de (8.13.0.PreAlpha4/8.13.0.PreAlpha4) with ESMTP id 
j2FMgICj016780
        for <[EMAIL PROTECTED]>; Tue, 15 Mar 2005 23:42:18 +0100 (MET)
Received: from sbeyer by littlefarm with local (Exim 3.36 #1 (Debian))
        id 1DBKjx-0000Wk-00
        for <[EMAIL PROTECTED]>; Tue, 15 Mar 2005 23:42:17 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Stephan Beyer <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: crack-attack: new upstream version / upstream changed
X-Mailer: reportbug 3.8
Date: Tue, 15 Mar 2005 23:42:17 +0100
Message-Id: <[EMAIL PROTECTED]>
Sender: Stephan Beyer <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: crack-attack
Version: 1.1.10-3
Severity: normal

Hi,

http://savannah.nongnu.org/projects/crack-attack
is the new URL of the project. It's not maintained by Daniel Nelson
anymore. 1.1.11 was released by the new maintainers. Please update :)

sbeyer


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.7
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages crack-attack depends on:
ii  freeglut3            2.2.0-8             OpenGL Utility Toolkit
ii  libc6                2.3.2.ds1-20        GNU C Library: Shared libraries an
ii  libgcc1              1:3.5-0pre0         GCC support library
ii  libice6              4.3.0.dfsg.1-12.0.1 Inter-Client Exchange library
ii  libsm6               4.3.0.dfsg.1-12.0.1 X Window System Session Management
ii  libstdc++5           1:3.3.5-9           The GNU Standard C++ Library v3
ii  libx11-6             4.3.0.dfsg.1-12.0.1 X Window System protocol client li
ii  libxi6               4.3.0.dfsg.1-12.0.1 X Window System Input extension li
ii  libxmu6              4.3.0.dfsg.1-12.0.1 X Window System miscellaneous util
ii  xlibmesa-gl [libgl1] 4.3.0.dfsg.1-12.0.1 Mesa 3D graphics library [XFree86]
ii  xlibmesa-glu [libglu 4.3.0.dfsg.1-12.0.1 Mesa OpenGL utility library [XFree
ii  xlibs                4.3.0.dfsg.1-12     X Keyboard Extension (XKB) configu

-- no debconf information

---------------------------------------
Received: (at 299705-close) by bugs.debian.org; 31 Mar 2005 14:14:54 +0000
>From [EMAIL PROTECTED] Thu Mar 31 06:14:54 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DH0Ri-0004Wb-00; Thu, 31 Mar 2005 06:14:54 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DH0FW-0002g3-00; Thu, 31 Mar 2005 09:02:18 -0500
From: Chris Boyle <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#299705: fixed in crack-attack 1.1.12-r1-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 31 Mar 2005 09:02:18 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: crack-attack
Source-Version: 1.1.12-r1-1

We believe that the bug you reported is fixed in the latest version of
crack-attack, which is due to be installed in the Debian FTP archive:

crack-attack_1.1.12-r1-1.diff.gz
  to pool/main/c/crack-attack/crack-attack_1.1.12-r1-1.diff.gz
crack-attack_1.1.12-r1-1.dsc
  to pool/main/c/crack-attack/crack-attack_1.1.12-r1-1.dsc
crack-attack_1.1.12-r1-1_i386.deb
  to pool/main/c/crack-attack/crack-attack_1.1.12-r1-1_i386.deb
crack-attack_1.1.12-r1.orig.tar.gz
  to pool/main/c/crack-attack/crack-attack_1.1.12-r1.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chris Boyle <[EMAIL PROTECTED]> (supplier of updated crack-attack package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 31 Mar 2005 14:34:36 +0100
Source: crack-attack
Binary: crack-attack
Architecture: source i386
Version: 1.1.12-r1-1
Distribution: unstable
Urgency: low
Maintainer: Chris Boyle <[EMAIL PROTECTED]>
Changed-By: Chris Boyle <[EMAIL PROTECTED]>
Description: 
 crack-attack - multiplayer OpenGL puzzle game like "Tetris Attack"
Closes: 159241 245157 299705
Changes: 
 crack-attack (1.1.12-r1-1) unstable; urgency=low
 .
   * New upstream release (closes: #299705)
     - Add new upstream url to copyright file
     - They fixed the 100% CPU usage (closes: #159241)
     - They fixed a segfault on startup (closes: #245157)
   * Add a proper watch file
   * Remove the REUSEADDR patch, upstream does this now
   * Build-dep on libgtk2.0-dev for new GTK UI
   * Add missing SDL build-deps
   * LevelLights.cxx: quote warning about flashing (doesn't compile otherwise)
Files: 
 ad1ad72cfc686a6a5d0f6333b56ac6a7 702 games optional 
crack-attack_1.1.12-r1-1.dsc
 3a306da1c3df7a1b3ea807ad2b0eaeac 833152 games optional 
crack-attack_1.1.12-r1.orig.tar.gz
 dd60255f303f7ebde8efb6188f140ce4 14981 games optional 
crack-attack_1.1.12-r1-1.diff.gz
 6d930d51539b0528d819787f2b55a553 575168 games optional 
crack-attack_1.1.12-r1-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCS/9mRi6ArLfYbg8RAuuvAJ4zL2d6YGPO8z9lr0v/EG2IDDOKVACgrLsi
XtIvsWDWvvWJDaoayiZiaDs=
=3E0+
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to