[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#323855: marked as done (ITP: opencvs -- OpenBSD CVS implementation with special emphasis in security)



Your message dated Sat, 01 Sep 2007 11:59:24 -0600
with message-id <E1IRXFk-0003tc-VZ@merkel.debian.org>
and subject line WNPP bug closing
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Luciano Bello <luciano@linux.org.ar>

* Package name    : opencvs
  Version         : unknown, posible release: 1st Sep
  Upstream Author : Jean-François Brousseau <jfb@cvs.openbsd.org>
* URL             : http://www.opencvs.org/
* License         : BSD
  Description     : OpenBSD CVS implementation with special emphasis in security

OpenCVS is a FREE implementation of the Concurrent Versions System, the
most popular open source revision control software. It can be used as
both client and server for repositories and provides granular access
control over data stored in the repository. It aims to be as compatible
as possible with other CVS implementations, except when particular
features reduce the overall security of the system.

The OpenCVS project was started after discussions regarding the latest
GNU CVS vulnerabilities that came out. Although CVS is widely used, its
development has been mostly stagnant in the last years and many security
issues have popped up, both in the implementation and in the mechanisms.

OpenCVS is primarily developed by Jean-François Brousseau as part of the
OpenBSD Project. The software is freely usable and re-usable by everyone
under a BSD license. 


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.10-1-686-smp
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)


--- End Message ---
--- Begin Message ---
Hello,

This is an automatic mail sent to close the ITP you have reported or 
are involved with.

Your ITP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.

As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not 
intended by owners and submitters (like you) to be closed, for
example if the ITP is still of your interest, or there has been 
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).

To re-open it, you simply have to mail control@bugs.debian.org
with a body text like this:

 reopen 323855
 stop

Further comments on the work done in the bug sent to
323855@bugs.debian.org would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <damog@debian.org>.

A similar process is being applied to other kind of wnpp bugs.

Thanks for your cooperation,

 -- David Moreno Garza <damog@debian.org>.
 

--- End Message ---

Reply to: