Bug#278191: marked as done (xtrlock unlocks upon very long input)

2005-01-20 Thread Debian Bug Tracking System
Your message dated Thu, 20 Jan 2005 10:37:55 +
with message-id [EMAIL PROTECTED]
and subject line DSA out
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 25 Oct 2004 12:16:52 +
From [EMAIL PROTECTED] Mon Oct 25 05:16:51 2004
Return-path: [EMAIL PROTECTED]
Received: from ns.ustc.edu.cn (mx1.ustc.edu.cn) [202.38.64.1] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CM3mL-00015F-00; Mon, 25 Oct 2004 05:16:50 -0700
Received: from mail.ustc.edu.cn (webmail.ustc.edu.cn [202.38.64.16])
by mx1.ustc.edu.cn (8.11.6/8.11.6) with SMTP id i9PC6QH25899
for [EMAIL PROTECTED]; Mon, 25 Oct 2004 20:06:27 +0800
Received: from 202.112.113.126 (proxying for unknown)
(SquirrelMail authenticated user muec)
by webmail.ustc.edu.cn with HTTP;
Mon, 25 Oct 2004 20:07:03 +0800 (CST)
Message-ID: [EMAIL PROTECTED]
Date: Mon, 25 Oct 2004 20:07:03 +0800 (CST)
Subject: xtrlock unlocks upon very long input
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Mailer: SquirrelMail (version 1.3.2)
MIME-Version: 1.0
Content-Type: text/plain;charset=gb2312
X-Priority: 3
Importance: Normal
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-5.4 required=4.0 tests=BAYES_01,HAS_PACKAGE,
NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 
X-CrossAssassin-Score: 2

Package: xtrlock
Version: 2.0-8

xtrlock can be bypassed by holding down any key for 1 minute and then
pressing Enter.

I am using Debian GNU/Linux 3.1, kernel 2.6.8-1-686,
libc6 2.3.2.ds1-16, xlibs 4.3.0.dfsg.1-7 and Gnome 2.


---
Received: (at 278190-done) by bugs.debian.org; 20 Jan 2005 10:38:02 +
From [EMAIL PROTECTED] Thu Jan 20 02:38:02 2005
Return-path: [EMAIL PROTECTED]
Received: from ppsw-3.csi.cam.ac.uk [131.111.8.133] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CrZhS-0004fh-00; Thu, 20 Jan 2005 02:38:02 -0800
Received: from genghis.vet.cam.ac.uk ([131.111.51.140]:49189)
by ppsw-3.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.153]:587)
with esmtpsa (PLAIN:mcv21) (TLSv1:RC4-SHA:128)
id 1CrZhN-0006FO-9j (Exim 4.44)
(return-path [EMAIL PROTECTED]); Thu, 20 Jan 2005 10:37:57 +
Mime-Version: 1.0 (Apple Message framework v619)
Content-Transfer-Encoding: 7bit
Message-Id: [EMAIL PROTECTED]
Content-Type: text/plain; charset=US-ASCII; format=flowed
To: [EMAIL PROTECTED],
 [EMAIL PROTECTED]
From: Matthew Vernon [EMAIL PROTECTED]
Subject: DSA out
Date: Thu, 20 Jan 2005 10:37:55 +
X-Mailer: Apple Mail (2.619)
Sender: [EMAIL PROTECTED]
X-Cam-ScannerInfo: http://www.cam.ac.uk/cs/email/scanner/
X-Cam-AntiVirus: No virus found
X-Cam-SpamDetails: Not scanned
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=0.0 required=4.0 tests=none autolearn=no 
version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


The DSA regarding these bugs has been released, so they can be laid to 
rest.

Matthew

-- 
Matthew Vernon MA VetMB LGSM MRCVS
Farm Animal Epidemiology and Informatics Unit
Department of Veterinary Medicine, University of Cambridge


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#278191: marked as done (xtrlock unlocks upon very long input)

2005-01-17 Thread Debian Bug Tracking System
Your message dated Mon, 17 Jan 2005 06:02:02 -0500
with message-id [EMAIL PROTECTED]
and subject line Bug#278190: fixed in xtrlock 2.0-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 25 Oct 2004 12:16:52 +
From [EMAIL PROTECTED] Mon Oct 25 05:16:51 2004
Return-path: [EMAIL PROTECTED]
Received: from ns.ustc.edu.cn (mx1.ustc.edu.cn) [202.38.64.1] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CM3mL-00015F-00; Mon, 25 Oct 2004 05:16:50 -0700
Received: from mail.ustc.edu.cn (webmail.ustc.edu.cn [202.38.64.16])
by mx1.ustc.edu.cn (8.11.6/8.11.6) with SMTP id i9PC6QH25899
for [EMAIL PROTECTED]; Mon, 25 Oct 2004 20:06:27 +0800
Received: from 202.112.113.126 (proxying for unknown)
(SquirrelMail authenticated user muec)
by webmail.ustc.edu.cn with HTTP;
Mon, 25 Oct 2004 20:07:03 +0800 (CST)
Message-ID: [EMAIL PROTECTED]
Date: Mon, 25 Oct 2004 20:07:03 +0800 (CST)
Subject: xtrlock unlocks upon very long input
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Mailer: SquirrelMail (version 1.3.2)
MIME-Version: 1.0
Content-Type: text/plain;charset=gb2312
X-Priority: 3
Importance: Normal
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-5.4 required=4.0 tests=BAYES_01,HAS_PACKAGE,
NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 
X-CrossAssassin-Score: 2

Package: xtrlock
Version: 2.0-8

xtrlock can be bypassed by holding down any key for 1 minute and then
pressing Enter.

I am using Debian GNU/Linux 3.1, kernel 2.6.8-1-686,
libc6 2.3.2.ds1-16, xlibs 4.3.0.dfsg.1-7 and Gnome 2.


---
Received: (at 278190-close) by bugs.debian.org; 17 Jan 2005 11:05:35 +
From [EMAIL PROTECTED] Mon Jan 17 03:05:35 2005
Return-path: [EMAIL PROTECTED]
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CqUhT-0001yn-00; Mon, 17 Jan 2005 03:05:35 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CqUe2-0005sD-00; Mon, 17 Jan 2005 06:02:02 -0500
From: Matthew Vernon [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#278190: fixed in xtrlock 2.0-9
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Mon, 17 Jan 2005 06:02:02 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: xtrlock
Source-Version: 2.0-9

We believe that the bug you reported is fixed in the latest version of
xtrlock, which is due to be installed in the Debian FTP archive:

xtrlock_2.0-9.dsc
  to pool/main/x/xtrlock/xtrlock_2.0-9.dsc
xtrlock_2.0-9.tar.gz
  to pool/main/x/xtrlock/xtrlock_2.0-9.tar.gz
xtrlock_2.0-9_i386.deb
  to pool/main/x/xtrlock/xtrlock_2.0-9_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthew Vernon [EMAIL PROTECTED] (supplier of updated xtrlock package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-BEGIN PGP SIGNED MESSAGE-

Format: 1.7
Date: Mon, 17 Jan 2005 10:47:09 +
Source: xtrlock
Binary: xtrlock
Architecture: source i386
Version: 2.0-9
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group [EMAIL PROTECTED]
Changed-By: Matthew Vernon [EMAIL PROTECTED]
Description: 
 xtrlock- Minimal X display lock program
Closes: 264173 278190 278191
Changes: 
 xtrlock (2.0-9) unstable; urgency=high
 .
   * Fix the problem whereby we unlocked on long input (closes: #278191, 
#278190)
   * tidy up a switch statement (closes: #264173)
Files: 
 2b5cb5f98847a8e37b618a95cac9f634 599 x11 optional xtrlock_2.0-9.dsc
 f268de7457416ba57d4b757e62e9eece 7437 x11