Your message dated Mon, 17 Jan 2005 06:02:02 -0500
with message-id [EMAIL PROTECTED]
and subject line Bug#278190: fixed in xtrlock 2.0-9
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--
Received: (at submit) by bugs.debian.org; 25 Oct 2004 12:16:52 +
From [EMAIL PROTECTED] Mon Oct 25 05:16:51 2004
Return-path: [EMAIL PROTECTED]
Received: from ns.ustc.edu.cn (mx1.ustc.edu.cn) [202.38.64.1]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CM3mL-00015F-00; Mon, 25 Oct 2004 05:16:50 -0700
Received: from mail.ustc.edu.cn (webmail.ustc.edu.cn [202.38.64.16])
by mx1.ustc.edu.cn (8.11.6/8.11.6) with SMTP id i9PC6QH25899
for [EMAIL PROTECTED]; Mon, 25 Oct 2004 20:06:27 +0800
Received: from 202.112.113.126 (proxying for unknown)
(SquirrelMail authenticated user muec)
by webmail.ustc.edu.cn with HTTP;
Mon, 25 Oct 2004 20:07:03 +0800 (CST)
Message-ID: [EMAIL PROTECTED]
Date: Mon, 25 Oct 2004 20:07:03 +0800 (CST)
Subject: xtrlock unlocks upon very long input
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Mailer: SquirrelMail (version 1.3.2)
MIME-Version: 1.0
Content-Type: text/plain;charset=gb2312
X-Priority: 3
Importance: Normal
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-5.4 required=4.0 tests=BAYES_01,HAS_PACKAGE,
NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
X-CrossAssassin-Score: 2
Package: xtrlock
Version: 2.0-8
xtrlock can be bypassed by holding down any key for 1 minute and then
pressing Enter.
I am using Debian GNU/Linux 3.1, kernel 2.6.8-1-686,
libc6 2.3.2.ds1-16, xlibs 4.3.0.dfsg.1-7 and Gnome 2.
---
Received: (at 278190-close) by bugs.debian.org; 17 Jan 2005 11:05:35 +
From [EMAIL PROTECTED] Mon Jan 17 03:05:35 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CqUhT-0001yn-00; Mon, 17 Jan 2005 03:05:35 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CqUe2-0005sD-00; Mon, 17 Jan 2005 06:02:02 -0500
From: Matthew Vernon [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#278190: fixed in xtrlock 2.0-9
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Mon, 17 Jan 2005 06:02:02 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
X-CrossAssassin-Score: 2
Source: xtrlock
Source-Version: 2.0-9
We believe that the bug you reported is fixed in the latest version of
xtrlock, which is due to be installed in the Debian FTP archive:
xtrlock_2.0-9.dsc
to pool/main/x/xtrlock/xtrlock_2.0-9.dsc
xtrlock_2.0-9.tar.gz
to pool/main/x/xtrlock/xtrlock_2.0-9.tar.gz
xtrlock_2.0-9_i386.deb
to pool/main/x/xtrlock/xtrlock_2.0-9_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Matthew Vernon [EMAIL PROTECTED] (supplier of updated xtrlock package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-BEGIN PGP SIGNED MESSAGE-
Format: 1.7
Date: Mon, 17 Jan 2005 10:47:09 +
Source: xtrlock
Binary: xtrlock
Architecture: source i386
Version: 2.0-9
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group [EMAIL PROTECTED]
Changed-By: Matthew Vernon [EMAIL PROTECTED]
Description:
xtrlock- Minimal X display lock program
Closes: 264173 278190 278191
Changes:
xtrlock (2.0-9) unstable; urgency=high
.
* Fix the problem whereby we unlocked on long input (closes: #278191,
#278190)
* tidy up a switch statement (closes: #264173)
Files:
2b5cb5f98847a8e37b618a95cac9f634 599 x11 optional xtrlock_2.0-9.dsc
f268de7457416ba57d4b757e62e9eece 7437 x11