Your message dated Wed, 24 Oct 2007 11:59:41 -0600 with message-id <E1IkkW5-0006rl-P9@merkel.debian.org> and subject line WNPP bug closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: ITP: debian-updates -- Keep track of relevent stable security updates.
- From: Khalid El Fathi <invent@edena-fr.org>
- Date: Thu, 17 Nov 2005 10:24:13 +0100
- Message-id: <437C4C3D.1040405@edena-fr.org>
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Package: wnpp Severity: wishlist Owner: Khalid El Fathi <invent@edena-fr.org> * Package name : debian-updates Version : 1.6.2 Upstream Author : Steve Kemp <steve@steve.org.uk> * URL : http://www.steve.org.uk/Software/debian-updates/ * License : GPL Description : Keep track of relevent stable security updates This is a simple script which is designed to keep a system administrator updated when relevent security advisories are released. . It will download the list of the latest security updates from the main security.debian.org website, if a locally installed package is vulnerable an email will be sent to a configurable address, or the details will be dumped to the console. . Homepage: http://www.steve.org.uk/Software/debian-updates/ - -- .''`. Khalid El Fathi : :' : invent@edena-fr.org `. `' www.edena-fr.org `- GPG: 1024D/5801E0DA -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDfEw9AA9uiVgB4NoRAiBBAJwJqVo8q+VhjteWc2/ap+3QMzeoPwCfbzF9 fNcr0tM1vnkL5QbU5DG1pCk= =3Tsl -----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
- To: 339576-done@bugs.debian.org
- Subject: WNPP bug closing
- From: David Moreno Garza <damog@merkel.debian.org>
- Date: Wed, 24 Oct 2007 11:59:41 -0600
- Message-id: <E1IkkW5-0006rl-P9@merkel.debian.org>
Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail control@bugs.debian.org with a body text like this: reopen 339576 stop Further comments on the work done in the bug sent to 339576@bugs.debian.org would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: <damog@debian.org>. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza <damog@debian.org>.
--- End Message ---