Your message dated Mon, 11 Jun 2012 16:35:54 +0000
with message-id <[email protected]>
and subject line Bug#677034: fixed in maelstrom 1.4.3-L3.0.6+main-1
has caused the Debian Bug report #677034,
regarding Please enable hardened build flags
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
677034: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677034
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: maelstrom
Version: 1.4.3-L3.0.6-11
Severity: important

Please enabled hardened build flags through dpkg-buildflags.

-- System Information:
Debian Release: 6.0.5
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



--- End Message ---
--- Begin Message ---
Source: maelstrom
Source-Version: 1.4.3-L3.0.6+main-1

We believe that the bug you reported is fixed in the latest version of
maelstrom, which is due to be installed in the Debian FTP archive:

maelstrom_1.4.3-L3.0.6+main-1.diff.gz
  to main/m/maelstrom/maelstrom_1.4.3-L3.0.6+main-1.diff.gz
maelstrom_1.4.3-L3.0.6+main-1.dsc
  to main/m/maelstrom/maelstrom_1.4.3-L3.0.6+main-1.dsc
maelstrom_1.4.3-L3.0.6+main-1_amd64.deb
  to main/m/maelstrom/maelstrom_1.4.3-L3.0.6+main-1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christoph Baumann <[email protected]> (supplier of updated maelstrom package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 11 Jun 2012 14:34:45 +0200
Source: maelstrom
Binary: maelstrom
Architecture: source amd64
Version: 1.4.3-L3.0.6+main-1
Distribution: unstable
Urgency: low
Maintainer: Christoph G. Baumann <[email protected]>
Changed-By: Christoph Baumann <[email protected]>
Description: 
 maelstrom  - An arcade-style game resembling Asteroids.
Closes: 673442 677029 677030 677034
Changes: 
 maelstrom (1.4.3-L3.0.6+main-1) unstable; urgency=low
 .
   * fix several lintian bugs
     - Closes: #677029
     - Closes: #677030
     - Closes: #673442
     - Closes: #677034
Checksums-Sha1: 
 5d5e5f42467ce30c055b8f4d31a2a8e04af2d881 1150 maelstrom_1.4.3-L3.0.6+main-1.dsc
 ffd678e7710da1a6309639ed65266aff5d81d589 84335 
maelstrom_1.4.3-L3.0.6+main-1.diff.gz
 ce6259213a2f124b78d82ba45ab2241cea07fab3 849778 
maelstrom_1.4.3-L3.0.6+main-1_amd64.deb
Checksums-Sha256: 
 87a4d0823347b9c7ddea56703bc39c55b8f7ae0e2923bc865eb8f0e6e22ff6b4 1150 
maelstrom_1.4.3-L3.0.6+main-1.dsc
 086802f4ccbefe30f049d79fadf72404e27f251a2aa206bc54a835c6a1d514a6 84335 
maelstrom_1.4.3-L3.0.6+main-1.diff.gz
 8b8f4086c2cb966f1508b952b31efdfa6aea7840f70bd3a88a3a7fbc2524ca74 849778 
maelstrom_1.4.3-L3.0.6+main-1_amd64.deb
Files: 
 e7eb3cd0eda7948aabc97c3053d1baba 1150 games optional 
maelstrom_1.4.3-L3.0.6+main-1.dsc
 6f20c7d226ef371f1095b2f03483824e 84335 games optional 
maelstrom_1.4.3-L3.0.6+main-1.diff.gz
 0af56e9467bec67f39b39fc4295b53fc 849778 games optional 
maelstrom_1.4.3-L3.0.6+main-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk/WGMwACgkQeAbNbxMxCOpfSQCfVetvEFKAX8SGZJsQwfgHRuat
7J0AoNO0WhBEw18d821URhCK7pmpbfUI
=tKVM
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to