Processing of jackd2_1.9.14~dfsg-0.1_source.changes

2020-07-08 Thread Debian FTP Masters
jackd2_1.9.14~dfsg-0.1_source.changes uploaded successfully to localhost along with the files: jackd2_1.9.14~dfsg-0.1.dsc jackd2_1.9.14~dfsg.orig.tar.gz jackd2_1.9.14~dfsg-0.1.debian.tar.xz jackd2_1.9.14~dfsg-0.1_amd64.buildinfo Greetings, Your Debian queue daemon (running on

ffmpeg_4.1.6-1~deb10u1_amd64.changes ACCEPTED into proposed-updates->stable-new

2020-07-08 Thread Debian FTP Masters
Mapping stable-security to proposed-updates. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 07 Jul 2020 18:50:33 +0200 Source: ffmpeg Binary: ffmpeg ffmpeg-dbgsym ffmpeg-doc libavcodec-dev libavcodec-extra libavcodec-extra58 libavcodec-extra58-dbgsym

Bug#964576: dav1d: FTBFS on x32: uses assembly that was not ported to x32

2020-07-08 Thread Thorsten Glaser
tags 964576 + patch thanks On Wed, 8 Jul 2020, Thorsten Glaser wrote: > dav1d misdetects x32 as amd64, leading to failures such as: > > /usr/bin/ld: i386:x86-64 architecture of input file > `src/25a6634@@dav1d@sha/loopfilter.obj' is incompatible with i386:x64-32 > output debdiff attached;

Processed: Re: Bug#964576: dav1d: FTBFS on x32: uses assembly that was not ported to x32

2020-07-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 964576 + patch Bug #964576 [src:dav1d] dav1d: FTBFS on x32: uses assembly that was not ported to x32 Added tag(s) patch. > thanks Stopping processing here. Please contact me if you need assistance. -- 964576:

Bug#964576: dav1d: FTBFS on x32: uses assembly that was not ported to x32

2020-07-08 Thread Thorsten Glaser
Source: dav1d Version: 0.7.1-2 Severity: important Tags: ftbfs Justification: fails to build from source, debian-ports architecture dav1d misdetects x32 as amd64, leading to failures such as: /usr/bin/ld: i386:x86-64 architecture of input file `src/25a6634@@dav1d@sha/loopfilter.obj' is

Bug#964552: [Security Issue][liblivemedia] stack buffer overflow in liblivemedia

2020-07-08 Thread Sebastian Ramacher
Control: tags -1 + moreinfo Hi On 2020-07-08 23:21:30 +0800, Xiaobo Xiang wrote: > Package: liblivemedia > Version: 06.25 > > [summary] > In the latest version of live555 mediaserver, there is a stack based buffer > overflow vulnerability when parsing 'PLAY' command. Which version do you mean?

Processed: Re: Bug#964552: [Security Issue][liblivemedia] stack buffer overflow in liblivemedia

2020-07-08 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + moreinfo Bug #964552 [liblivemedia] [Security Issue][liblivemedia] stack buffer overflow in liblivemedia Added tag(s) moreinfo. -- 964552: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964552 Debian Bug Tracking System Contact ow...@bugs.debian.org

libudfread_1.1.0-1_amd64.changes is NEW

2020-07-08 Thread Debian FTP Masters
binary:libudfread-dev is NEW. binary:libudfread0 is NEW. binary:libudfread-dev is NEW. binary:libudfread0 is NEW. source:libudfread is NEW. Your package has been put into the NEW queue, which requires manual action from the ftpteam to process. The upload was otherwise valid (it had a good OpenPGP

Processing of libudfread_1.1.0-1_amd64.changes

2020-07-08 Thread Debian FTP Masters
libudfread_1.1.0-1_amd64.changes uploaded successfully to localhost along with the files: libudfread_1.1.0-1.dsc libudfread_1.1.0.orig.tar.gz libudfread_1.1.0-1.debian.tar.xz libudfread-dev_1.1.0-1_amd64.deb libudfread0-dbgsym_1.1.0-1_amd64.deb libudfread0_1.1.0-1_amd64.deb

snd_20.5-2_source.changes ACCEPTED into unstable

2020-07-08 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Mon, 06 Jul 2020 14:29:25 +0200 Source: snd Architecture: source Version: 20.5-2 Distribution: unstable Urgency: medium Maintainer: Debian Multimedia Maintainers Changed-By: IOhannes m zmölnig (Debian/GNU) Changes:

Processing of snd_20.5-2_source.changes

2020-07-08 Thread Debian FTP Masters
snd_20.5-2_source.changes uploaded successfully to localhost along with the files: snd_20.5-2.dsc snd_20.5-2.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

xawtv_3.107-1_source.changes ACCEPTED into unstable

2020-07-08 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 05 Jul 2020 17:42:23 +0100 Source: xawtv Architecture: source Version: 3.107-1 Distribution: unstable Urgency: medium Maintainer: Debian Multimedia Maintainers Changed-By: Jeremy Sowden Closes: 962221 Changes:

Processing of xawtv_3.107-1_source.changes

2020-07-08 Thread Debian FTP Masters
xawtv_3.107-1_source.changes uploaded successfully to localhost along with the files: xawtv_3.107-1.dsc xawtv_3.107.orig.tar.bz2 xawtv_3.107-1.debian.tar.xz xawtv_3.107-1_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#962221: marked as done (xawtv: CVE-2020-13696)

2020-07-08 Thread Debian Bug Tracking System
Your message dated Wed, 08 Jul 2020 10:51:31 + with message-id and subject line Bug#962221: fixed in xawtv 3.107-1 has caused the Debian Bug report #962221, regarding xawtv: CVE-2020-13696 to be marked as done. This means that you claim that the problem has been dealt with. If this is not

Re: Fixes for CVE-2020-13696 (#962221)

2020-07-08 Thread Mattia Rizzolo
On Wed, Jul 08, 2020 at 09:07:25AM +0100, Jeremy Sowden wrote: ... > The new upstream release added extra checks to ensure that the object at > the end of the path is a device file of the right sort before opening > it: ... > However, the error messages still leak information, allowing the user to

Re: Fixes for CVE-2020-13696 (#962221)

2020-07-08 Thread Jeremy Sowden
On 2020-07-06, at 19:11:09 +, Vasyl Gello wrote: > July 6, 2020 6:58:05 PM UTC, Mattia Rizzolo написав(-ла): > > On Mon, Jul 06, 2020 at 05:10:30AM +, Vasyl Gello wrote: > > > Thanks for contributing the security release! I checked your > > > changes and pushed them to the team repo. I

Processed: py2removal bugs severity updates - 2020-07-08 07:05:48.385357+00:00

2020-07-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # This is an automated script, part of the effort for the removal of Python 2 > from bullseye > # * https://wiki.debian.org/Python/2Removal > # * http://sandrotosi.me/debian/py2removal/index.html > # See

Processed: py2removal bugs severity updates - 2020-07-08 07:00:39.510986+00:00

2020-07-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # This is an automated script, part of the effort for the removal of Python 2 > from bullseye > # * https://wiki.debian.org/Python/2Removal > # * http://sandrotosi.me/debian/py2removal/index.html > # See

Processed: py2removal bugs severity updates - 2020-07-08 06:56:36.594312+00:00

2020-07-08 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # This is an automated script, part of the effort for the removal of Python 2 > from bullseye > # * https://wiki.debian.org/Python/2Removal > # * http://sandrotosi.me/debian/py2removal/index.html > # See