Your message dated Wed, 19 May 2004 10:32:13 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#249705: fixed in netkit-bootparamd 0.17-6 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 18 May 2004 22:55:40 +0000 >From [EMAIL PROTECTED] Tue May 18 15:55:40 2004 Return-path: <[EMAIL PROTECTED]> Received: from sorrow.cyrius.com [65.19.161.204] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BQDUq-0004Ow-00; Tue, 18 May 2004 15:55:40 -0700 Received: by sorrow.cyrius.com (Postfix, from userid 10) id 4625064D3C; Tue, 18 May 2004 22:55:38 +0000 (UTC) Received: by deprecation.cyrius.com (Postfix, from userid 1000) id 5A81810032; Tue, 18 May 2004 23:54:28 +0100 (BST) Date: Tue, 18 May 2004 23:54:28 +0100 From: Martin Michlmayr <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Cc: Herbert Xu <[EMAIL PROTECTED]> Subject: O: netkit-bootparamd -- Boot parameter server. Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.6i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: wnpp Severity: normal The current maintainer of netkit-bootparamd, Herbert Xu <[EMAIL PROTECTED]>, has orphaned this package. If you want to be the new maintainer, please take it -- see http://www.debian.org/devel/wnpp/index.html#howto-o for detailed instructions how to adopt a package properly. Some information about this package: Package: netkit-bootparamd Binary: bootparamd Version: 0.17-5 Priority: optional Section: net Maintainer: Herbert Xu <[EMAIL PROTECTED]> Build-Depends: debhelper (>= 2) Architecture: any Standards-Version: 3.6.1 Format: 1.0 Directory: pool/main/n/netkit-bootparamd Files: 6901f564ade0941cf2b20778aad685a0 722 netkit-bootparamd_0.17-5.dsc 00d211115b11aec2e214b701fe72f397 13934 netkit-bootparamd_0.17.orig.tar.gz 95e8b09c75f843bdcb0010059b5860b4 3644 netkit-bootparamd_0.17-5.diff.gz Package: bootparamd Priority: optional Section: net Installed-Size: 108 Maintainer: Herbert Xu <[EMAIL PROTECTED]> Architecture: i386 Source: netkit-bootparamd Version: 0.17-5 Depends: portmap, libc6 (>= 2.3.2-1) Filename: pool/main/n/netkit-bootparamd/bootparamd_0.17-5_i386.deb Size: 13574 MD5sum: 0d462baf25e9b6db2a0c9915fe6bc433 Description: Boot parameter server. bootparamd is a server process that provides information to diskless clients necessary for booting. It consults the /etc/bootparams file to find the information it needs. -- Martin Michlmayr [EMAIL PROTECTED] --------------------------------------- Received: (at 249705-close) by bugs.debian.org; 19 May 2004 14:38:35 +0000 >From [EMAIL PROTECTED] Wed May 19 07:38:34 2004 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BQSDK-0005m1-00; Wed, 19 May 2004 07:38:34 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1BQS7B-0004VQ-00; Wed, 19 May 2004 10:32:13 -0400 From: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.49 $ Subject: Bug#249705: fixed in netkit-bootparamd 0.17-6 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Wed, 19 May 2004 10:32:13 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Source: netkit-bootparamd Source-Version: 0.17-6 We believe that the bug you reported is fixed in the latest version of netkit-bootparamd, which is due to be installed in the Debian FTP archive: bootparamd_0.17-6_i386.deb to pool/main/n/netkit-bootparamd/bootparamd_0.17-6_i386.deb netkit-bootparamd_0.17-6.diff.gz to pool/main/n/netkit-bootparamd/netkit-bootparamd_0.17-6.diff.gz netkit-bootparamd_0.17-6.dsc to pool/main/n/netkit-bootparamd/netkit-bootparamd_0.17-6.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Alberto Gonzalez Iniesta <[EMAIL PROTECTED]> (supplier of updated netkit-bootparamd package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 19 May 2004 16:17:50 +0200 Source: netkit-bootparamd Binary: bootparamd Architecture: source i386 Version: 0.17-6 Distribution: unstable Urgency: low Maintainer: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]> Changed-By: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]> Description: bootparamd - Boot parameter server. Closes: 249705 Changes: netkit-bootparamd (0.17-6) unstable; urgency=low . * New Maintainer. (Closes: #249705) Files: 04bb02b9c50667b872264a2b0026c34f 590 net optional netkit-bootparamd_0.17-6.dsc fa79abd9f6159864db2c85389fcd0ac1 3715 net optional netkit-bootparamd_0.17-6.diff.gz 2267d14ceddc7f65dbac25650cd13397 13636 net optional bootparamd_0.17-6_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFAq2zExRSvjkukAcMRAkk4AJ911X77CuyRsSFy3P6X/rWs3m2zRwCg73Wi PKNt1dOEePWnKzAh5NQbEM0= =Bjl7 -----END PGP SIGNATURE-----