Your message dated Sun, 08 Jun 2008 11:59:42 -0600 with message-id <E1K5PB8-0008Sp-Ez@merkel.debian.org> and subject line WNPP bug closing has caused the Debian Bug report #426626, regarding ITP: libsudo-perl -- Perl extension for running a command line sudo to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 426626: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426626 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: ITP: libsudo-perl - Perl extension for running a command line sudo
- From: Alejandro Garrido Mota <garridomota@gmail.com>
- Date: Tue, 29 May 2007 23:27:56 -0400
- Message-id: <465CEF3C.9000509@gmail.com>
Package: wnpp Severity: wishlist * Package name : libsudo-perl * Version : 0.30 * Upstream Author : Joe Landman <landman@scalableinformatics.com> * URL : http://search.cpan.org/~landman/Sudo-0.31/ * License : Artistic * Description : (see below) Description: Sudo - Perl extension for running a command line sudo Sudo runs commands as another user, provided the system sudo implementation is setup to enable this. This does not allow running applications securely, simply it allows the programmer to run a program as another user (suid) using the sudo tools rather than suidperl. Suidperl is not generally recommended for secure operation as another user. While sudo itself is a single point tool to enable one user to execute commands as another sudo does not itself make you any more or less secure. . Homepage: http://search.cpan.org/~landman/Sudo-0.30/ Bye -- Alejandro Garrido Mota http://www.mogaal.com GNU/Linux Debian SID En kernel 2.6.20 Caracas-Venezuela Usuario Linux registrado #386758 Correos: mogaal@debian.org.ve , mogaal@chaslug.org.ve GPG Key Fingerprint = F6A7 EF7E 4688 70C6 6B37 A8EF F6B0 9645 B24B F200
--- End Message ---
--- Begin Message ---
- To: 426626-done@bugs.debian.org
- Subject: WNPP bug closing
- From: David Moreno Garza <damog@merkel.debian.org>
- Date: Sun, 08 Jun 2008 11:59:42 -0600
- Message-id: <E1K5PB8-0008Sp-Ez@merkel.debian.org>
Hello, This is an automatic mail sent to close the ITP you have reported or are involved with. Your ITP wnpp bug is being closed because of the following reasons: - It is, as of today, older than 365 days. - It hasn't had any activity recently. As this is an automatic procedure, it could of course have something wrong and probably it would be closing some bugs that are not intended by owners and submitters (like you) to be closed, for example if the ITP is still of your interest, or there has been some kind of activity around it. In that case, please reopen the bug, do it, DO IT NOW! (I don't want to be blamed because of mass closing and not let people know that they can easily reopen their bugs ;-). To re-open it, you simply have to mail control@bugs.debian.org with a body text like this: reopen 426626 stop Further comments on the work done in the bug sent to 426626@bugs.debian.org would be truly welcomed. Anyway, if you have any kind of problems when dealing with the BTS, feel free to contact me and I'd be more than happy to help you on this: <damog@debian.org>. A similar process is being applied to other kind of wnpp bugs. Thanks for your cooperation, -- David Moreno Garza <damog@debian.org>.
--- End Message ---