On Fri, Nov 22, Ruediger Meier wrote:
Just an example what we are talking about. For example emails like this from opensuse-updates@opensuse.org:
------ openSUSE Security Update: kernel: security and bugfix update ______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0396-1 Rating: important References: #714906 #720226 #733148 #755546 #762693 #765524 #768506 #769784 #769896 #770695 #773406 #773831 #774285 #774523 #774859 #776144 #778630 #779432 #781134 #783515 #784192 #786013 #787168 #792500 #793671 #797175 #799209 #800280 #801178 #801782 #802153 #802642 #804154 #804652 #804738 Cross-References: CVE-2012-0957 CVE-2012-2745 CVE-2012-3412 CVE-2012-4530 CVE-2013-0160 CVE-2013-0216 CVE-2013-0231 CVE-2013-0268 CVE-2013-0309 CVE-2013-0871 Affected Products: openSUSE 12.1 [...] ------
Such emails should be rejected automatically. The plans in Tomáš initial email are a nice first step.
And the people who can read that bugs would complain, because they don't know if their bug is fixed with this release or not. Please start thinking about the consequences not only for you personal, but for other people, too. And no, I don't speak here about SUSE employees. Only because you cannot see a bug, this does not mean other external cannot see it, too. Thorsten -- Thorsten Kukuk, Senior Architect SLES & Common Code Base SUSE LINUX Products GmbH, Maxfeldstr. 5, D-90409 Nuernberg GF: Jeff Hawn, Jennifer Guild, Felix Imendörffer, HRB 16746 (AG Nürnberg) -- To unsubscribe, e-mail: opensuse-packaging+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse-packaging+owner@opensuse.org