FAQ Search Today's Posts Mark Forums Read
» Video Reviews

» Linux Archive

Linux-archive is a website aiming to archive linux email lists and to make them easily accessible for linux users/developers.


» Sponsor

» Partners

» Sponsor

Go Back   Linux Archive > Debian > Debian Development

 
 
LinkBack Thread Tools
 
Old 07-03-2008, 06:39 AM
Johannes Wiedersich
 
Default bug closed by $p4m mail?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all!

One of my bug reports appears to have been closed by a s_p_a_m mail:

> #325588: kile crashes on auto-save, incurring data loss
>
> It has been closed by "Theron Landers"
> <tollboothj3@trademarkmedical.com> (reply to
> tollboothj3@trademarkmedical.com).
>
> Their explanation is attached below along with your original report.
> If this explanation is unsatisfactory and you have not received a
> better one in a separate message then please contact "Theron Landers"
> <tollboothj3@trademarkmedical.com> (reply to
> tollboothj3@trademarkmedical.com) by replying to this email.
>
>
> -- 325588: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=325588
> Debian Bug Tracking System Contact owner@bugs.debian.org with
> problems
>
>
>
> Subject: will load patterns into your who've faced the look "in the
> wild".
> From: "Theron Landers" <tollboothj3@trademarkmedical.com>
> Date: Mon, 30 Jun 2008 20:06:25 +0900
> To: 325542@bugs.debian.org
>
[Removed senseless text from original mail in order not to fool the
filters. ]

What is the proper way to get the s_p_a_m removed from the bts and to
reopen the bug? To contact the 'sender' of the spam mail as suggested by
the bts seems absurd.

By now, from [1] the s_p_a_m mail has been removed, but the archiving of
the bug has not been reversed [2].

Just curious what was going on...

[I have recently upgraded to lenny and have been running a test over
about a week to check whether the problem still occurs with the version
in lenny. It seems the bug can either be closed or at least the severity
could be lowered by now. ]

Thanks in advance!

Johannes


[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=325588
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=53;bug=325588
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIbHQcC1NzPRl9qEURAp2ZAJ4/pxyQeRuZGmJ7OjFdgPcSqPmvfQCfa2uc
6qyxvSEs+yuw0q8KPPkBe1w=
=Vm6u
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-devel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
 
Old 07-03-2008, 06:58 AM
Lars Wirzenius
 
Default bug closed by $p4m mail?

to, 2008-07-03 kello 08:39 +0200, Johannes Wiedersich kirjoitti:
> What is the proper way to get the s_p_a_m removed from the bts and to
> reopen the bug? To contact the 'sender' of the spam mail as suggested by
> the bts seems absurd.

For removing the spam, see the link near the bottom of the bug page for
reporting it. The BTS admins will look at it and remove it as necessary.

For unarchiving and un-closing, use the control bot
(control@bugs.debian.org).



--
To UNSUBSCRIBE, email to debian-devel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
 
Old 07-03-2008, 07:34 AM
Johannes Wiedersich
 
Default bug closed by $p4m mail?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 2008-07-03 08:58, Lars Wirzenius wrote:
> For unarchiving and un-closing, use the control bot
> (control@bugs.debian.org).

I didn't know about the 'unarchive' command.

Thanks, everything is fine now!

Johannes
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIbID1C1NzPRl9qEURAqDHAJ9h5YQ2FdDF8wqctIx2hT MEHNYdIgCeLTmf
AM6xJ/wC2afoULe1DF3A7RU=
=5zgW
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-devel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
 

Thread Tools




All times are GMT. The time now is 07:51 AM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.
Copyright 2007 - 2008, www.linux-archive.org