Your message dated Tue, 17 Jun 2025 20:32:16 +0000 with message-id <E1uRcye-004e1K-21@respighi.debian.org> and subject line unblock xorg-server has caused the Debian Bug report #1107941, regarding unblock: xorg-server/2:21.1.16-1.2 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1107941: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107941 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: unblock: xorg-server/2:21.1.16-1.2
- From: Salvatore Bonaccorso <carnil@debian.org>
- Date: Tue, 17 Jun 2025 21:13:24 +0200
- Message-id: <[🔎] 175018760448.2868827.11597379161563345824.reportbug@eldamar.lan>
Package: release.debian.org Severity: normal X-Debbugs-Cc: xorg-server@packages.debian.org, Debian X Strike Force <debian-x@lists.debian.org>, Emilio Pozuelo Monfort <pochu@debian.org>, Timo Aaltonen <tjaalton@ubuntu.com>, Julien Cristau <jcristau@debian.org>, carnil@debian.org, debian-boot@lists.debian.org, kibi@debian.org Control: affects -1 + src:xorg-server User: release.debian.org@packages.debian.org Usertags: unblock Control: tags -1 + d-i Hi, Please unblock package xorg-server [ Reason ] xorg-server is prone to several CVEs as published today in https://lists.freedesktop.org/archives/xorg-announce/2025-June/003608.html, more precisely CVE-2025-49175, CVE-2025-49176, CVE-2025-49177, CVE-2025-49178, CVE-2025-49179 and CVE-2025-49180. [ Impact ] Version in trixie remains (for now vulnerable o those CVEs). A DSA for bookworm is planned after bit of exposure in unstable. [ Tests ] None concretely for the CVEs, basic functional tests. [ Risks ] Patches come from upstream, in past we had some fallouts. OTOH we got validated patches from upstream which got applied. [ Checklist ] [x] all changes are documented in the d/changelog [x] I reviewed all changes and I approve them [x] attach debdiff against the package in testing unblock xorg-server/2:21.1.16-1.2 Regards, Salvatore
--- End Message ---
--- Begin Message ---
- To: 1107941-done@bugs.debian.org
- Subject: unblock xorg-server
- From: Sebastian Ramacher <sramacher@respighi.debian.org>
- Date: Tue, 17 Jun 2025 20:32:16 +0000
- Message-id: <E1uRcye-004e1K-21@respighi.debian.org>
Unblocked.
--- End Message ---