Your message dated Sat, 1 Apr 2006 13:55:27 -0800 with message-id <20060401215527.GB2032@mauritius.dodds.net> and subject line Bug#360388: xserver-xorg: local user DoS and arbitrary code execution as root [CVE-2006-0745] has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: xserver-xorg: local user DoS and arbitrary code execution as root [CVE-2006-0745]
- From: Filipus Klutiero <cheal@hotpop.com>
- Date: Sat, 01 Apr 2006 16:05:16 -0500
- Message-id: <[🔎] 20060401210516.24137.50827.reportbug@vinci>
Package: xserver-xorg Version: 6.9.0.dfsg.1-4 Severity: grave Tags: security, upstream Justification: user security hole An upstream vulnerability rated as critical by upstream (bug #6213) was fixed in 6.9.0.dfsg.1-5, which was uploaded with urgency high. I'm opening this bug to track this nevertheless, as the transition to testing appears to be problematic.
--- End Message ---
--- Begin Message ---
- To: Filipus Klutiero <cheal@hotpop.com>, 360388-done@bugs.debian.org
- Subject: Re: Bug#360388: xserver-xorg: local user DoS and arbitrary code execution as root [CVE-2006-0745]
- From: Steve Langasek <vorlon@debian.org>
- Date: Sat, 1 Apr 2006 13:55:27 -0800
- Message-id: <20060401215527.GB2032@mauritius.dodds.net>
- In-reply-to: <[🔎] 20060401210516.24137.50827.reportbug@vinci>
- References: <[🔎] 20060401210516.24137.50827.reportbug@vinci>
Version: 6.9.0.dfsg.1-5 On Sat, Apr 01, 2006 at 04:05:16PM -0500, Filipus Klutiero wrote: > Package: xserver-xorg > Version: 6.9.0.dfsg.1-4 > Severity: grave > Tags: security, upstream > Justification: user security hole > An upstream vulnerability rated as critical by upstream (bug #6213) was > fixed in 6.9.0.dfsg.1-5, which was uploaded with urgency high. I'm > opening this bug to track this nevertheless, as the transition to > testing appears to be problematic. Then you should also mark it as *closed* in -5, otherwise you're *complicating* the transition to testing. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. vorlon@debian.org http://www.debian.org/Attachment: signature.asc
Description: Digital signature
--- End Message ---