jackd2_1.9.14~dfsg-0.1_source.changes uploaded successfully to localhost
along with the files:
jackd2_1.9.14~dfsg-0.1.dsc
jackd2_1.9.14~dfsg.orig.tar.gz
jackd2_1.9.14~dfsg-0.1.debian.tar.xz
jackd2_1.9.14~dfsg-0.1_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on
Mapping stable-security to proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 07 Jul 2020 18:50:33 +0200
Source: ffmpeg
Binary: ffmpeg ffmpeg-dbgsym ffmpeg-doc libavcodec-dev libavcodec-extra
libavcodec-extra58 libavcodec-extra58-dbgsym
tags 964576 + patch
thanks
On Wed, 8 Jul 2020, Thorsten Glaser wrote:
> dav1d misdetects x32 as amd64, leading to failures such as:
>
> /usr/bin/ld: i386:x86-64 architecture of input file
> `src/25a6634@@dav1d@sha/loopfilter.obj' is incompatible with i386:x64-32
> output
debdiff attached;
Processing commands for cont...@bugs.debian.org:
> tags 964576 + patch
Bug #964576 [src:dav1d] dav1d: FTBFS on x32: uses assembly that was not ported
to x32
Added tag(s) patch.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
964576:
Source: dav1d
Version: 0.7.1-2
Severity: important
Tags: ftbfs
Justification: fails to build from source, debian-ports architecture
dav1d misdetects x32 as amd64, leading to failures such as:
/usr/bin/ld: i386:x86-64 architecture of input file
`src/25a6634@@dav1d@sha/loopfilter.obj' is
Control: tags -1 + moreinfo
Hi
On 2020-07-08 23:21:30 +0800, Xiaobo Xiang wrote:
> Package: liblivemedia
> Version: 06.25
>
> [summary]
> In the latest version of live555 mediaserver, there is a stack based buffer
> overflow vulnerability when parsing 'PLAY' command.
Which version do you mean?
Processing control commands:
> tags -1 + moreinfo
Bug #964552 [liblivemedia] [Security Issue][liblivemedia] stack buffer overflow
in liblivemedia
Added tag(s) moreinfo.
--
964552: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964552
Debian Bug Tracking System
Contact ow...@bugs.debian.org
binary:libudfread-dev is NEW.
binary:libudfread0 is NEW.
binary:libudfread-dev is NEW.
binary:libudfread0 is NEW.
source:libudfread is NEW.
Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP
libudfread_1.1.0-1_amd64.changes uploaded successfully to localhost
along with the files:
libudfread_1.1.0-1.dsc
libudfread_1.1.0.orig.tar.gz
libudfread_1.1.0-1.debian.tar.xz
libudfread-dev_1.1.0-1_amd64.deb
libudfread0-dbgsym_1.1.0-1_amd64.deb
libudfread0_1.1.0-1_amd64.deb
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 06 Jul 2020 14:29:25 +0200
Source: snd
Architecture: source
Version: 20.5-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Changed-By: IOhannes m zmölnig (Debian/GNU)
Changes:
snd_20.5-2_source.changes uploaded successfully to localhost
along with the files:
snd_20.5-2.dsc
snd_20.5-2.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 05 Jul 2020 17:42:23 +0100
Source: xawtv
Architecture: source
Version: 3.107-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Changed-By: Jeremy Sowden
Closes: 962221
Changes:
xawtv_3.107-1_source.changes uploaded successfully to localhost
along with the files:
xawtv_3.107-1.dsc
xawtv_3.107.orig.tar.bz2
xawtv_3.107-1.debian.tar.xz
xawtv_3.107-1_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Wed, 08 Jul 2020 10:51:31 +
with message-id
and subject line Bug#962221: fixed in xawtv 3.107-1
has caused the Debian Bug report #962221,
regarding xawtv: CVE-2020-13696
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not
On Wed, Jul 08, 2020 at 09:07:25AM +0100, Jeremy Sowden wrote:
...
> The new upstream release added extra checks to ensure that the object at
> the end of the path is a device file of the right sort before opening
> it:
...
> However, the error messages still leak information, allowing the user to
On 2020-07-06, at 19:11:09 +, Vasyl Gello wrote:
> July 6, 2020 6:58:05 PM UTC, Mattia Rizzolo написав(-ла):
> > On Mon, Jul 06, 2020 at 05:10:30AM +, Vasyl Gello wrote:
> > > Thanks for contributing the security release! I checked your
> > > changes and pushed them to the team repo. I
Processing commands for cont...@bugs.debian.org:
> # This is an automated script, part of the effort for the removal of Python 2
> from bullseye
> # * https://wiki.debian.org/Python/2Removal
> # * http://sandrotosi.me/debian/py2removal/index.html
> # See
Processing commands for cont...@bugs.debian.org:
> # This is an automated script, part of the effort for the removal of Python 2
> from bullseye
> # * https://wiki.debian.org/Python/2Removal
> # * http://sandrotosi.me/debian/py2removal/index.html
> # See
Processing commands for cont...@bugs.debian.org:
> # This is an automated script, part of the effort for the removal of Python 2
> from bullseye
> # * https://wiki.debian.org/Python/2Removal
> # * http://sandrotosi.me/debian/py2removal/index.html
> # See
19 matches
Mail list logo