GNU bug report logs

#48039 xorg-server might be vulnerable to CVE-2021-3472

PackageSource(s)Maintainer(s)
guix-patches PTS Buildd Popcon
Full log

Message #32 received at 48039-done@debbugs.gnu.org (full text, mbox, reply):

Received: (at 48039-done) by debbugs.gnu.org; 27 Apr 2021 06:03:06 +0000
From debbugs-submit-bounces@debbugs.gnu.org Tue Apr 27 02:03:06 2021
Received: from localhost ([127.0.0.1]:47777 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces@debbugs.gnu.org>)
	id 1lbGoM-0000ha-8L
	for submit@debbugs.gnu.org; Tue, 27 Apr 2021 02:03:06 -0400
Received: from out3-smtp.messagingengine.com ([66.111.4.27]:59981)
 by debbugs.gnu.org with esmtp (Exim 4.84_2)
 (envelope-from <leo@famulari.name>) id 1lbGo7-0000gk-Tf
 for 48039-done@debbugs.gnu.org; Tue, 27 Apr 2021 02:03:04 -0400
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41])
 by mailout.nyi.internal (Postfix) with ESMTP id CC0FC5C01AD;
 Tue, 27 Apr 2021 02:02:46 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162])
 by compute1.internal (MEProxy); Tue, 27 Apr 2021 02:02:46 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=famulari.name;
 h=date:from:to:cc:subject:message-id:references:mime-version
 :content-type:in-reply-to; s=mesmtp; bh=KpE/vtIlF/hShemeDttRpmgu
 g4mO+UCuKJlxTT1Rinw=; b=zqWIt++HvO3vn52KF83YFGhp4YfLtHe072VWW4vT
 SCn+HzCvy0HvCAkxBBts4SDnzlrORCzulR3zsGvcEF7PJfaezwYDwHx7i4KIVYBb
 eRw9kebovCLPdfUIk3h+yLQNE/sh6BLvbcXjlYETyXPfmaX3PvbrLNVjQ94TlBn6
 8Og=
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
 messagingengine.com; h=cc:content-type:date:from:in-reply-to
 :message-id:mime-version:references:subject:to:x-me-proxy
 :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=KpE/vt
 IlF/hShemeDttRpmgug4mO+UCuKJlxTT1Rinw=; b=LP4ji7GvmeR/kx8rPwxB/F
 TCSSXFVcTcSizc1rsHkC3tKy/EUK7AZ+S4BhTgWoxUsjt3EZJit4lS6kFZyt2Y23
 y8Mn5KvVb8oEssylOJahPD16YgyeuPXH7Hetvi7aGqf6tsTZguc07yYEf2wVU1I0
 KqotQovKmoWUHGzQEqqeS+y0Qx4BLOeDqdIuNQHyQZPldgLV+Zv7H0Gacb+2B1IW
 9rZODcHB9ufsOGDFNCHNvXbYs/On7lFa0Oc+momuWTL6LOYWVM117DwCZjC6ZR7+
 ojY9prRcr4q34okdMgHns4uNJpXCIy/rjLmO5iHdGTwOAs89bY41b0nKBNpcwX3w
 ==
X-ME-Sender: <xms:BqmHYNaOvE8gJK3b8RHtGQLRcvXVo0LU0dW0mHDt8NUZeqsJvP9UPQ>
 <xme:BqmHYEYx2-Ri-3S6IS6wRmz7LMJ-eUjd8uKxPihtG55vecCKBzu3Gz1TQ9NT6taRa
 0HNY8B2uB3_xtvuSw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrvdduledgudeffecutefuodetggdotefrod
 ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh
 necuuegrihhlohhuthemuceftddtnecunecujfgurhepfffhvffukfhfgggtuggjsehgtd
 erredttddvnecuhfhrohhmpefnvghoucfhrghmuhhlrghrihcuoehlvghosehfrghmuhhl
 rghrihdrnhgrmhgvqeenucggtffrrghtthgvrhhnpedukeevgeetkeeltefgiedtjefgje
 ekffduteehvdfhueekudelieekjeefheffteenucfkphepuddttddruddurdduieelrddu
 udeknecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomheplh
 gvohesfhgrmhhulhgrrhhirdhnrghmvg
X-ME-Proxy: <xmx:BqmHYP82gXcxvmAYfN8sR8mr_5ipFNYm3Bf6XMicXfMO6qwvGyhGPQ>
 <xmx:BqmHYLrwZBPvDDEAmuWeIuD1qUSE9zPuDh5dVwKbsVY8VKLb1BKXfQ>
 <xmx:BqmHYIpf_WVnzOBB6MclZGUGGsSq3re9-IVG2eqfnGvAQkSejycmzQ>
 <xmx:BqmHYOEGvqwCoi80wdTVPlaFejQf6NVLxCi214eUaGaSXIAiqmzUiA>
Received: from localhost (pool-100-11-169-118.phlapa.fios.verizon.net
 [100.11.169.118]) by mail.messagingengine.com (Postfix) with ESMTPA;
 Tue, 27 Apr 2021 02:02:46 -0400 (EDT)
Date: Tue, 27 Apr 2021 02:02:45 -0400
From: Leo Famulari <leo@famulari.name>
To: Nicolò Balzarotti <anothersms@gmail.com>
Subject: Re: bug#48039: xorg-server might be vulnerable to CVE-2021-3472
Message-ID: <YIepBamiF2f838F2@jasmine.lan>
References: <878s55rm9c.fsf@guixSD.i-did-not-set--mail-host-address--so-tickle-me>
 <YIb53KSJPfQf5mn6@jasmine.lan>
 <8735vcsxxt.fsf@guixSD.i-did-not-set--mail-host-address--so-tickle-me>
 <YIcVjQ/oLozIA8Ki@jasmine.lan>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature"; boundary="5svL07BQC6m902I5"
Content-Disposition: inline
In-Reply-To: <YIcVjQ/oLozIA8Ki@jasmine.lan>
X-Spam-Score: 0.0 (/)
X-Debbugs-Envelope-To: 48039-done
Cc: 48039-done@debbugs.gnu.org
X-BeenThere: debbugs-submit@debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit@debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request@debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces@debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces@debbugs.gnu.org>
X-Spam-Score: -1.7 (-)
[Message part 1 (text/plain, inline)]
On Mon, Apr 26, 2021 at 03:33:33PM -0400, Leo Famulari wrote:
> I'm merging the two tickets. I think that updating the package is a
> better choice that simply patching it. I'll probably join our two
> patches together and push that.

Done as 6afe1543271637e3fd1eac82f5ec7af6975a47a5. Thanks for looking out
for these bugs!
[signature.asc (application/pgp-signature, inline)]

Send a report that this bug log contains spam.


debbugs.gnu.org maintainers <help-debbugs@gnu.org>. Last modified: Sun Dec 22 01:08:50 2024; Machine Name: wallace-server

GNU bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.