On Tue, Jun 06, 2006 at 11:04:40PM +0100, Darren Salt wrote:
I demand that Reinhard Tartler may or may not have written...
[snip]
I prepared an upload here:
http://siretart.tauware.de/upload-queue/xine-lib_1.1.1-2.dsc
It needs the attached patch (committed to CVS by Matthias Hopf).
I
And another patch, prompted by Martin Michlmayr's posting in debian-devel
about gcc 4.1 being the default for etch. Changelog entry addition:
* Kill some pointer-int casting warnings on 64-bit architectures.
(All three fixes are in CVS HEAD; I've just committed two of them.)
--
| Darren Salt
I demand that Reinhard Tartler may or may not have written...
[snip]
I prepared an upload here:
http://siretart.tauware.de/upload-queue/xine-lib_1.1.1-2.dsc
It needs the attached patch (committed to CVS by Matthias Hopf).
--
| Darren Salt| linux or ds at | nr. Ashington, |
On Sat, Jun 03, 2006 at 02:37:47PM +0100, Darren Salt wrote:
I took your source package and gave it the version 1.1.1-2. I sucessfully
built it on amd64, but got no sound at all (but might be chroot related, so
I'm not sure).
Bind-mounting /dev should fix that :-)
(I can test on amd64
I demand that Reinhard Tartler may or may not have written...
On Fri, Jun 02, 2006 at 10:10:01PM +0100, Darren Salt wrote:
The .diff.gz, .dsc etc. for 1.1.1-1.2 are at
URL:http://zap.tartarus.org/~ds/debian/
Btw, why aren't you in Uploaders: and prepare a new maintainer upload?
Siggi -
On Thu, Jun 01, 2006 at 11:17:48PM +0100, Darren Salt wrote:
I'm going to prepare an NMU (sponsored by Adeodato Simó) which may or may
not fix this bug (but will fix various others, particularly the build failure
on sparc, which is due to a missing -I dir). It should also fix the
sorry,
I demand that Reinhard Tartler may or may not have written...
On Thu, Jun 01, 2006 at 11:17:48PM +0100, Darren Salt wrote:
I'm going to prepare an NMU (sponsored by Adeodato Simó) which may or may
not fix this bug (but will fix various others, particularly the build
failure on sparc, which is
On Fri, Jun 02, 2006 at 07:14:05PM +0100, Darren Salt wrote:
I demand that Reinhard Tartler may or may not have written...
I'm going to prepare an NMU (sponsored by Adeodato Simó) which may or may
not fix this bug (but will fix various others, particularly the build
failure on sparc,
I demand that Reinhard Tartler may or may not have written...
On Fri, Jun 02, 2006 at 07:14:05PM +0100, Darren Salt wrote:
[snip]
On mips, the problem in the buildd log is too-early use of inline
functions; you should find that my VDR-patched version is buildable there,
or at least fails
* Reinhard Tartler [Fri, 02 Jun 2006 21:41:02 +0200]:
Hey,
On Fri, Jun 02, 2006 at 07:14:05PM +0100, Darren Salt wrote:
I demand that Reinhard Tartler may or may not have written...
How about uploading it to experimental first, and give more ppl the chance
of actually testing it?
I demand that Adeodato Simó may or may not have written...
* Reinhard Tartler [Fri, 02 Jun 2006 21:41:02 +0200]:
On Fri, Jun 02, 2006 at 07:14:05PM +0100, Darren Salt wrote:
I demand that Reinhard Tartler may or may not have written...
How about uploading it to experimental first, and give
I'm going to prepare an NMU (sponsored by Adeodato Simó) which may or may
not fix this bug (but will fix various others, particularly the build failure
on sparc, which is due to a missing -I dir). It should also fix the
sorry, unimplemented failures on some other architectures, which is due to
use
Stefan Fritsch wrote:
Package: libxine1
Version: 1.1.1-1
Severity: grave
Tags: security
Justification: user security hole
According to CVE-2006-1664, there is a buffer overflow in
xine_list_delete_current in libxine 1.14 and earlier, as distributed
in xine-lib 1.1.1 and earlier,
No, I didn't test the exploit when I filed the bug. I can't reproduce
the crash now, neither with xine nor gxine (gxine is in a separate
package).
The file seems to be asf, and normally the xine in debian can play
(or at least demux) asf. Either Debian's xine is not vulnerable
because some
Package: libxine1
Version: 1.1.1-1
Severity: grave
Tags: security
Justification: user security hole
According to CVE-2006-1664, there is a buffer overflow in
xine_list_delete_current in libxine 1.14 and earlier, as distributed
in xine-lib 1.1.1 and earlier, allows remote attackers to execute
15 matches
Mail list logo