Processing commands for [EMAIL PROTECTED]: > clone 298939 -1 Bug#298939: libxpm4: new buffer overflow security hole (CAN-2005-0605) Bug 298939 cloned as bug 299272.
> reassign -1 libxpm4 Bug#299272: libxpm4: new buffer overflow security hole (CAN-2005-0605) Bug reassigned from package `libxpm4' to `libxpm4'. > retitle 298939 xlibs: new buffer overflow security hole (CAN-2005-0605) Bug#298939: libxpm4: new buffer overflow security hole (CAN-2005-0605) Changed Bug title. > reassign 298939 xlibs Bug#298939: xlibs: new buffer overflow security hole (CAN-2005-0605) Bug reassigned from package `libxpm4' to `xlibs'. > # Per the bug logs, the Debian Security Team has xfree86 4.1.0-16woody6, > # which fixes this. It's also fixed in the X Strike Force Subversion > # repository for XFree86, in branches/4.1.0/woody. > tag 298939 + pending woody Bug#298939: xlibs: new buffer overflow security hole (CAN-2005-0605) Tags were: fixed-upstream patch security upstream Tags added: pending, woody > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

