[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#278191: marked as done (xtrlock unlocks upon very long input)



Your message dated Mon, 17 Jan 2005 06:02:02 -0500
with message-id <E1CqUe2-0005sD-00@newraff.debian.org>
and subject line Bug#278190: fixed in xtrlock 2.0-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 25 Oct 2004 12:16:52 +0000
>From muec@mail.ustc.edu.cn Mon Oct 25 05:16:51 2004
Return-path: <muec@mail.ustc.edu.cn>
Received: from ns.ustc.edu.cn (mx1.ustc.edu.cn) [202.38.64.1] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CM3mL-00015F-00; Mon, 25 Oct 2004 05:16:50 -0700
Received: from mail.ustc.edu.cn (webmail.ustc.edu.cn [202.38.64.16])
	by mx1.ustc.edu.cn (8.11.6/8.11.6) with SMTP id i9PC6QH25899
	for <submit@bugs.debian.org>; Mon, 25 Oct 2004 20:06:27 +0800
Received: from 202.112.113.126 (proxying for unknown)
        (SquirrelMail authenticated user muec)
        by webmail.ustc.edu.cn with HTTP;
        Mon, 25 Oct 2004 20:07:03 +0800 (CST)
Message-ID: <57953.202.112.113.126.1098706023.squirrel@webmail.ustc.edu.cn>
Date: Mon, 25 Oct 2004 20:07:03 +0800 (CST)
Subject: xtrlock unlocks upon very long input
From: muec@mail.ustc.edu.cn
To: submit@bugs.debian.org
X-Mailer: SquirrelMail (version 1.3.2)
MIME-Version: 1.0
Content-Type: text/plain;charset=gb2312
X-Priority: 3
Importance: Normal
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-5.4 required=4.0 tests=BAYES_01,HAS_PACKAGE,
	NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 
X-CrossAssassin-Score: 2

Package: xtrlock
Version: 2.0-8

xtrlock can be bypassed by holding down any key for 1 minute and then
pressing Enter.

I am using Debian GNU/Linux 3.1, kernel 2.6.8-1-686,
libc6 2.3.2.ds1-16, xlibs 4.3.0.dfsg.1-7 and Gnome 2.


---------------------------------------
Received: (at 278190-close) by bugs.debian.org; 17 Jan 2005 11:05:35 +0000
>From katie@ftp-master.debian.org Mon Jan 17 03:05:35 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CqUhT-0001yn-00; Mon, 17 Jan 2005 03:05:35 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1CqUe2-0005sD-00; Mon, 17 Jan 2005 06:02:02 -0500
From: Matthew Vernon <matthew@debian.org>
To: 278190-close@bugs.debian.org
X-Katie: $Revision: 1.55 $
Subject: Bug#278190: fixed in xtrlock 2.0-9
Message-Id: <E1CqUe2-0005sD-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Mon, 17 Jan 2005 06:02:02 -0500
Delivered-To: 278190-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: xtrlock
Source-Version: 2.0-9

We believe that the bug you reported is fixed in the latest version of
xtrlock, which is due to be installed in the Debian FTP archive:

xtrlock_2.0-9.dsc
  to pool/main/x/xtrlock/xtrlock_2.0-9.dsc
xtrlock_2.0-9.tar.gz
  to pool/main/x/xtrlock/xtrlock_2.0-9.tar.gz
xtrlock_2.0-9_i386.deb
  to pool/main/x/xtrlock/xtrlock_2.0-9_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 278190@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthew Vernon <matthew@debian.org> (supplier of updated xtrlock package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----

Format: 1.7
Date: Mon, 17 Jan 2005 10:47:09 +0000
Source: xtrlock
Binary: xtrlock
Architecture: source i386
Version: 2.0-9
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group <packages@qa.debian.org>
Changed-By: Matthew Vernon <matthew@debian.org>
Description: 
 xtrlock    - Minimal X display lock program
Closes: 264173 278190 278191
Changes: 
 xtrlock (2.0-9) unstable; urgency=high
 .
   * Fix the problem whereby we unlocked on long input (closes: #278191, #278190)
   * tidy up a switch statement (closes: #264173)
Files: 
 2b5cb5f98847a8e37b618a95cac9f634 599 x11 optional xtrlock_2.0-9.dsc
 f268de7457416ba57d4b757e62e9eece 7437 x11 optional xtrlock_2.0-9.tar.gz
 c35a5610aa22f4371cfc083f6bdfcc9d 9142 x11 optional xtrlock_2.0-9_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQCVAwUBQeuYF7DSad4X89TRAQHqngP/crvhfHGo463PFP16jtPA6MVTTW2YX0eq
dc87l0eFxFK/Fq6r9I3GTKmQ1LDA7M8ok0zB2DetRvZJg+qZcycUSI7DKLwDEYHp
7H/Je+6Vv/dxWbSwhlIa1lcJLFyJ5HVnjem0sGZuJnNM73M1RqeLxpNuIJBO+z52
Nl4aFO4b55s=
=pPXN
-----END PGP SIGNATURE-----



Reply to: