From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 125787 invoked by alias); 26 Jul 2016 18:07:54 -0000 Mailing-List: contact overseers-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: , Sender: overseers-owner@sourceware.org Received: (qmail 125706 invoked by uid 89); 26 Jul 2016 18:07:54 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_PASS autolearn=ham version=3.3.2 spammy=flood X-HELO: gnu.wildebeest.org Received: from wildebeest.demon.nl (HELO gnu.wildebeest.org) (212.238.236.112) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-SHA encrypted) ESMTPS; Tue, 26 Jul 2016 18:07:43 +0000 Date: Tue, 26 Jul 2016 18:07:00 -0000 From: Mark Wielaard To: overseers@sourceware.org Subject: GCC/classpath bugzilla spam Message-ID: <20160726180721.GA3644@blokker> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.6.2 (2016-07-01) X-Spam-Score: -2.9 (--) X-SW-Source: 2016-q3/txt/msg00017.txt.bz2 Hi, GNU Classpath uses the GCC bugzilla for issue tracking. It seems there is a large flood of spam the last two days. I see around 50 new spam bugs being opened just the last 6 hours. See https://lists.gnu.org/archive/html/bug-classpath/2016-07/index.html Unfortunately I am travelling and don't have easy internet access. Could someone take a look to see if there can be anything done to stop people creating new "spam" bugs? Thanks, Mark