ardour_5.4.0~dfsg-1_amd64.changes is NEW

2016-10-18 Thread Debian FTP Masters
binary:ardour-video-timeline is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html

___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers


Processing of ardour_5.4.0~dfsg-1_amd64.changes

2016-10-18 Thread Debian FTP Masters
ardour_5.4.0~dfsg-1_amd64.changes uploaded successfully to localhost
along with the files:
  ardour_5.4.0~dfsg-1.dsc
  ardour_5.4.0~dfsg.orig.tar.bz2
  ardour_5.4.0~dfsg-1.debian.tar.xz
  ardour-altivec_5.4.0~dfsg-1_all.deb
  ardour-data_5.4.0~dfsg-1_all.deb
  ardour-dbgsym_5.4.0~dfsg-1_amd64.deb
  ardour-i686_5.4.0~dfsg-1_all.deb
  ardour-video-timeline_5.4.0~dfsg-1_all.deb
  ardour3_5.4.0~dfsg-1_all.deb
  ardour_5.4.0~dfsg-1_amd64.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)

___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers


Bug#797965: bs1770gain somehow "destroys" gapless playback on (at least) lame encoded MP3s

2016-10-18 Thread Andreas Cadhalpun
Control: tags -1 fixed-upstream

Hi Cris,

On 29.06.2016 21:56, Christoph Anton Mitterer wrote:
> Andreas, anything new on this? What happened to your proposed patch?

Jon Toohill managed to write a proper patch for this and it is now
fixed upstream [1].

Best regards,
Andreas


1: 
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3b02f6dd7be880fd6c1bcaf2fd0c1314dcee7aa6

___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers


Processed: Re: Bug#797965: bs1770gain somehow "destroys" gapless playback on (at least) lame encoded MP3s

2016-10-18 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 fixed-upstream
Bug #797965 [libavformat-dev] bs1770gain somehow "destroys" gapless playback on 
(at least) lame encoded MP3s
Added tag(s) fixed-upstream.

-- 
797965: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797965
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers


zita-resampler_1.6.0-1_amd64.changes ACCEPTED into unstable

2016-10-18 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Mon, 17 Oct 2016 04:22:44 +0200
Source: zita-resampler
Binary: libzita-resampler-dev libzita-resampler-doc libzita-resampler1 
zita-resampler
Architecture: source amd64 all
Version: 1.6.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers 

Changed-By: Jaromír Mikeš 
Description:
 libzita-resampler-dev - Development files (headers) for libzita-resampler 
library
 libzita-resampler-doc - Developers reference for libzita-resampler library
 libzita-resampler1 - C++ library for resampling audio signals
 zita-resampler - resampler application written with libzita-resampler
Changes:
 zita-resampler (1.6.0-1) unstable; urgency=medium
 .
   [ Alessio Treglia ]
   * Remove obsolete DM-Upload-Allowed field.
 .
   [ Jaromír Mikeš ]
   * New upstream version 1.6.0
   * Patch refreshed.
   * Bump Standards.
   * Fix VCS fields.
   * Set dh/compat 10.
   * Drop dbg package in favour of dbgsym.
   * Fix some hardening.
Checksums-Sha1:
 177933c35e1343072314aa4ee281bf92d26e7663 2333 zita-resampler_1.6.0-1.dsc
 3b7e1af2b3f10b0a5ce9bf2267b1f7871173bdb3 126427 
zita-resampler_1.6.0.orig.tar.bz2
 2a4d6d3c4622ac7374321317c5ffefaaf3737ada 5356 
zita-resampler_1.6.0-1.debian.tar.xz
 1b5545fc89cb13918a1ffec136a9e881a05ef186 4704 
libzita-resampler-dev_1.6.0-1_amd64.deb
 02d5c1eaa35240f8ae704d6bd2144499ba92631e 99566 
libzita-resampler-doc_1.6.0-1_all.deb
 fd5083c4d4ec2b93b95185bee8f320e2fc826a61 21050 
libzita-resampler1-dbgsym_1.6.0-1_amd64.deb
 6ef32d7e75d8e0eecf089eed6c4f016352f3c268 11190 
libzita-resampler1_1.6.0-1_amd64.deb
 503e0dfce5a7089ca47b48d97dbc2b4cc79fd96e 37216 
zita-resampler-dbgsym_1.6.0-1_amd64.deb
 944d8f48afd886e96e6a42b15f10de618e26039b 14270 zita-resampler_1.6.0-1_amd64.deb
Checksums-Sha256:
 0b272810f614c33796be7a62a16b97d111730bfea9415c979f17d3e78970afaf 2333 
zita-resampler_1.6.0-1.dsc
 10888d76299d8072990939be45d6fc5865f5a45d766d7690819c5899d2a588f0 126427 
zita-resampler_1.6.0.orig.tar.bz2
 5add56dffdfea834c85a461a05872e858dedb0e02a9bf785d3083f1473369369 5356 
zita-resampler_1.6.0-1.debian.tar.xz
 e3725e636bdf83791660ca7f5585f704c9efc18a01ee941667880c8ef4772ac6 4704 
libzita-resampler-dev_1.6.0-1_amd64.deb
 d95a871c5b02fca893cbc38b6d4383b3e3da5911ae32416e856ae2387bca14fd 99566 
libzita-resampler-doc_1.6.0-1_all.deb
 95777d20eb30efd789cd0d5fa6cf6efb2ea94cbd09014511346b69a9f55d1ba6 21050 
libzita-resampler1-dbgsym_1.6.0-1_amd64.deb
 41e9cf50c955acba67f25a211a018cbb390bf3db4d9453d5d714418e73930d8d 11190 
libzita-resampler1_1.6.0-1_amd64.deb
 176887c56a8e2c0e89d4939a442bc19ca33bff77547be9160c80379a00a07ae0 37216 
zita-resampler-dbgsym_1.6.0-1_amd64.deb
 59738c0ab273e4274df4d348fbaf4efa5a95163ea4d596bc2c48840cf8299338 14270 
zita-resampler_1.6.0-1_amd64.deb
Files:
 8797a7b7bbf2c4e52e6630ddcd761c36 2333 sound optional zita-resampler_1.6.0-1.dsc
 7b5ddc42f210985b29c8769111217e4c 126427 sound optional 
zita-resampler_1.6.0.orig.tar.bz2
 29f8902eb7e2e54a18b04dc8cacf9200 5356 sound optional 
zita-resampler_1.6.0-1.debian.tar.xz
 198241131d1e36032026ddafb223412d 4704 libdevel optional 
libzita-resampler-dev_1.6.0-1_amd64.deb
 a28c1c49db3c71d0ffc169ab108511d2 99566 doc optional 
libzita-resampler-doc_1.6.0-1_all.deb
 0040f3df7329ba9091caadd21945241b 21050 debug extra 
libzita-resampler1-dbgsym_1.6.0-1_amd64.deb
 2600d20e2e3b5a7836a28c5e2ce728f5 11190 libs optional 
libzita-resampler1_1.6.0-1_amd64.deb
 d51dad8a47adf7296cd05ede3c7f04a0 37216 debug extra 
zita-resampler-dbgsym_1.6.0-1_amd64.deb
 51d60eaf7b6b0e79c68621353a61626b 14270 sound optional 
zita-resampler_1.6.0-1_amd64.deb

-BEGIN PGP SIGNATURE-
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=PYwL
-END PGP SIGNATURE-


Thank you for your contribution to Debian.

___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers

Bug#841224: MediaTomb Multiple Remote Vulnerabilities

2016-10-18 Thread James Cowgill
Control: severity -1 grave
Control: tags -1 security
Control: retitle -1 mediatomb: libupnp vulnerabilities CVE-2012-5958, 
CVE-2012-5959, CVE-2012-5960, CVE-2016-6255
Control: found -1 0.12.1-4

On 18/10/16 17:17, Brian Martin wrote:
> Package: mediatomb
> Version: 0.12.1-47

This version does not exist, I have marked it as found in 0.12.1-4
(pre-wheezy) as a conservative guess.

> This was discovered on Ubuntu and reported to them. Ubuntu replied that
> the package is inherited from Debian "which means it isn't supported by
> the Ubuntu Security Team."

The reason it's not supported in Ubuntu is because it's in the
"universe" repository which does not get security support (not that it
comes from Debian).

> While testing a new NASL detection script, we found it was causing a
> crash in MediaTomb. Specifically, there is a NULL pointer dereference at
> in the function check_soap_body() in soap_device.c (line 470). We went
> to see if this had been patched in libupnp and found that it had been
> patched eight years ago
> (https://sourceforge.net/p/pupnp/code/ci/2c094ee8ea01259967f82513296b031f718603fd/).
> 
> 
> Given that MediaTomb is still being distributed by Ubuntu and more than
> 1,000 instances are visible via Shodan
> (https://www.shodan.io/search?query=MediaTomb), we will make a
> best-effort to quickly flag some of the vulnerabilities that we know
> have been fixed in libupnp and still exist in MediaTomb. All of the
> below have been tested on Ubuntu 16.04 x64 Desktop using mediatomb-dbg.
> We believe them to be vulnerable in Debian 8.6 (jesse) as well.
> 
> CVE-2012-5958, CVE-2012-5959, CVE-2012-5960
[...]
> CVE-2016-6255
> 
> This allows a remote unauthenticated attacker create arbitrary files in
> the WebRoot simply by sending an HTTP POST request. Note that Ubuntu's
> mediatomb installation must have write permission to the WebRoot
> directory. This issue has been patched by c91a8a3
> (https://sourceforge.net/p/pupnp/code/ci/c91a8a3903367e1163765b73eb4d43be7d7927fa/)
> and 66e43a2
> (https://sourceforge.net/p/pupnp/code/ci/66e43a28d27fee95d270d2b8106d8a099c14f334/).
> We wrote a PoC cleverly called "cve-2016-6255.py" that when used like so:
> 
> $ ./cve-2016-6255.py http://192.168.1.217:49153/danger_zone

Apparently it is not possible to remove mediatomb's copy of libupnp due
to the number of changes and those changes cannot be upstreamed due to
licensing issues. This means the libupnp fixed will have to be patched
into mediatomb.

Unfortunately upstream has been fairly inactive over the last few years
so any fixes probably won't come from them :( 

Thanks for reporting!
James



signature.asc
Description: OpenPGP digital signature
___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers

Processed: Re: Bug#841224: MediaTomb Multiple Remote Vulnerabilities

2016-10-18 Thread Debian Bug Tracking System
Processing control commands:

> severity -1 grave
Bug #841224 [mediatomb] MediaTomb Multiple Remote Vulnerabilities
Severity set to 'grave' from 'critical'
> tags -1 security
Bug #841224 [mediatomb] MediaTomb Multiple Remote Vulnerabilities
Added tag(s) security.
> retitle -1 mediatomb: libupnp vulnerabilities CVE-2012-5958, CVE-2012-5959, 
> CVE-2012-5960, CVE-2016-6255
Bug #841224 [mediatomb] MediaTomb Multiple Remote Vulnerabilities
Changed Bug title to 'mediatomb: libupnp vulnerabilities CVE-2012-5958, 
CVE-2012-5959, CVE-2012-5960, CVE-2016-6255' from 'MediaTomb Multiple Remote 
Vulnerabilities'.
> found -1 0.12.1-4
Bug #841224 [mediatomb] mediatomb: libupnp vulnerabilities CVE-2012-5958, 
CVE-2012-5959, CVE-2012-5960, CVE-2016-6255
Marked as found in versions mediatomb/0.12.1-4.

-- 
841224: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841224
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers


ffmpeg 7:3.1.4-1 MIGRATED to testing

2016-10-18 Thread Debian testing watch
FYI: The status of the ffmpeg source package
in Debian's testing distribution has changed.

  Previous version: 7:3.1.3-2
  Current version:  7:3.1.4-1

-- 
This email is automatically generated once a day.  As the installation of
new packages into testing happens multiple times a day you will receive
later changes on the next day.
See https://release.debian.org/testing-watch/ for more information.

___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers


Processed: Bug#766424: jackd2: please enable using OSS on GNU/kFreeBSD

2016-10-18 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 - patch
Bug #766424 [jackd2] jackd2: please enable using OSS on GNU/kFreeBSD
Removed tag(s) patch.

-- 
766424: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766424
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers


Bug#766424: jackd2: please enable using OSS on GNU/kFreeBSD

2016-10-18 Thread James Cowgill
Control: tags -1 - patch

Hi Steven,

On Thu, 23 Oct 2014 00:33:58 +0100 Steven Chamberlain wrote:
> Package: jackd2
> Version: 1.9.10+20140719git3eb0ae6a~dfsg-2
> Severity: important
> Tags: patch
> User: debian-...@lists.debian.org
> Usertags: kfreebsd
> 
> Hi,
> 
> Please could you accept this patch to use OSS on GNU/kFreeBSD.
> Otherwise jackd2 does not have any useful local audio device backends.
> 
> This has been well-tested on my system.

Unfortunately this patch no longer applies. Is it possible for you to
have another look (and submit it upstream)?

Thanks,
James



signature.asc
Description: OpenPGP digital signature
___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers

Bug#841224: MediaTomb Multiple Remote Vulnerabilities

2016-10-18 Thread Brian Martin
Package: mediatomb
Version: 0.12.1-47
Severity: critical


This was discovered on Ubuntu and reported to them. Ubuntu replied that
the package is inherited from Debian "which means it isn't supported by
the Ubuntu Security Team." We notified secur...@debian.org who suggested
we open a ticket. If any of our PoCs are required, we will share via
email with Debian or any other Linux vendor impacted, but not make them
public in a tracker.

--

While testing a new NASL detection script, we found it was causing a
crash in MediaTomb. Specifically, there is a NULL pointer dereference at
in the function check_soap_body() in soap_device.c (line 470). We went
to see if this had been patched in libupnp and found that it had been
patched eight years ago
(https://sourceforge.net/p/pupnp/code/ci/2c094ee8ea01259967f82513296b031f718603fd/).


Given that MediaTomb is still being distributed by Ubuntu and more than
1,000 instances are visible via Shodan
(https://www.shodan.io/search?query=MediaTomb), we will make a
best-effort to quickly flag some of the vulnerabilities that we know
have been fixed in libupnp and still exist in MediaTomb. All of the
below have been tested on Ubuntu 16.04 x64 Desktop using mediatomb-dbg.
We believe them to be vulnerable in Debian 8.6 (jesse) as well.

CVE-2012-5958, CVE-2012-5959, CVE-2012-5960

Humorously? Fedora actually has this in their bug tracker for MediaTomb
along with the other 2012 stack overflows, all unfixed
(https://bugzilla.redhat.com/show_bug.cgi?id=906045), despite an
upstream patch being available
(https://sourceforge.net/p/pupnp/code/ci/2bb79879b77dd215a26c92d1348adf2ae406dfd8/).

We've written a PoC cleverly named "cve-2012-5958.py" that triggers the
issue, producing the following stack trace:

(gdb) bt
#0  0x74ec9418 in __GI_raise (sig=sig@entry=6) at
../sysdeps/unix/sysv/linux/raise.c:54
#1  0x74ecb01a in __GI_abort () at abort.c:89
#2  0x74f0b72a in __libc_message (do_abort=do_abort@entry=2,
fmt=fmt@entry=0x75022c7f "*** %s ***: %s terminated\n") at
../sysdeps/posix/libc_fatal.c:175
#3  0x74fac89c in __GI___fortify_fail (msg=,
msg@entry=0x75022c10 "buffer overflow detected") at fortify_fail.c:37
#4  0x74faa8a0 in __GI___chk_fail () at chk_fail.c:28
#5  0x74fa9d49 in __strncpy_chk (s1=,
s2=, n=, s1len=) at
strncpy_chk.c:26
#6  0x0052110a in strncpy (__len=421, __src=,
__dest=0x7fffdf7fd590 "4") at
/usr/include/x86_64-linux-gnu/bits/string3.h:126
#7  unique_service_name (cmd=cmd@entry=0x7fffd0001280
"ssdp:uuid:schemas:device:", 'a' ...,
Evt=Evt@entry=0x7fffdf7fd770) at ../upnp/src/ssdp/ssdp_server.c:532
#8  0x00521392 in ssdp_request_type (cmd=0x7fffd0001280
"ssdp:uuid:schemas:device:", 'a' ...,
Evt=Evt@entry=0x7fffdf7fd770) at ../upnp/src/ssdp/ssdp_server.c:634
#9  0x00524e0a in ssdp_handle_device_request
(hmsg=hmsg@entry=0x7fffd80008c0,
dest_addr=dest_addr@entry=0x7fffd8000a38) at
../upnp/src/ssdp/ssdp_device.c:157
#10 0x005209cd in ssdp_event_handler_thread
(the_data=0x7fffd80008c0) at ../upnp/src/ssdp/ssdp_server.c:797
#11 0x00523373 in WorkerThread (arg=0x798d00 )
at ../threadutil/src/ThreadPool.c:594
#12 0x770d76fa in start_thread (arg=0x7fffdf7fe700) at
pthread_create.c:333
#13 0x74f9ab5d in clone () at
../sysdeps/unix/sysv/linux/x86_64/clone.S:109

We’ve also written a PoC named "cve-2012-5959.py" (consistency is key)
that triggers the issue, producing the following stack trace:

(gdb) bt
#0  0x74ec9418 in __GI_raise (sig=sig@entry=6) at
../sysdeps/unix/sysv/linux/raise.c:54
#1  0x74ecb01a in __GI_abort () at abort.c:89
#2  0x74f0b72a in __libc_message (do_abort=do_abort@entry=2,
fmt=fmt@entry=0x75022c7f "*** %s ***: %s terminated\n") at
../sysdeps/posix/libc_fatal.c:175
#3  0x74fac89c in __GI___fortify_fail (msg=,
msg@entry=0x75022c10 "buffer overflow detected") at fortify_fail.c:37
#4  0x74faa8a0 in __GI___chk_fail () at chk_fail.c:28
#5  0x74fa9d49 in __strncpy_chk (s1=,
s2=, n=, s1len=) at
strncpy_chk.c:26
#6  0x005211a1 in strncpy (__len=404, __src=0x7fffb4001190
"uuid:", 'a' ..., __dest=0x7fffbfffe784 "") at
/usr/include/x86_64-linux-gnu/bits/string3.h:126
#7  unique_service_name (cmd=cmd@entry=0x7fffb4001190 "uuid:", 'a'
..., Evt=Evt@entry=0x7fffbfffe770) at
../upnp/src/ssdp/ssdp_server.c:544
#8  0x00521392 in ssdp_request_type (cmd=0x7fffb4001190 "uuid:",
'a' ..., Evt=Evt@entry=0x7fffbfffe770) at
../upnp/src/ssdp/ssdp_server.c:634
#9  0x00524e0a in ssdp_handle_device_request
(hmsg=hmsg@entry=0x7fffd80011a0,
dest_addr=dest_addr@entry=0x7fffd8001318) at
../upnp/src/ssdp/ssdp_device.c:157
#10 0x005209cd in ssdp_event_handler_thread
(the_data=0x7fffd80011a0) at ../upnp/src/ssdp/ssdp_server.c:797
#11 0x00523373 in WorkerThread (arg=0x798d00 )
at ../threadutil/src/ThreadPool.c:594
#12 0x770d76fa in start_thread (arg=0x7fffb700) at

Bug#601008: marked as done (jackd2: jackd gets stuck in infinite loop after laptop suspend/resume)

2016-10-18 Thread Debian Bug Tracking System
Your message dated Tue, 18 Oct 2016 17:22:40 +0100
with message-id <69dd63f4-9409-4acd-0751-00b79ca6c...@debian.org>
and subject line Bug#601008: jackd2: jackd gets stuck in infinite loop after 
laptop suspend/resume
has caused the Debian Bug report #601008,
regarding jackd2: jackd gets stuck in infinite loop after laptop suspend/resume
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
601008: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601008
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: jackd2
Version: 1.9.5~dfsg-19
Severity: normal


jackd starts and runs fine on my laptop, but after a suspend/resume
cycle jackd sometimes gets stuck in an infinite loop, using 100% of
one of the CPU cores. I would expect a couple of xruns or other audio
glitches, but not this type of complete lockup.

Steps to reproduce:

1. Run 'jackd -P70 -dalsa -p256 -n2 -r48000 -P'
2. Suspend the computer to RAM
3. Wake the computer back up

The output looks like this:


[ll@innsmouth ~]$ jackd -P70 -d alsa -p256 -n2 -r48000 -P
jackdmp 1.9.6
Copyright 2001-2005 Paul Davis and others.
Copyright 2004-2010 Grame.
jackdmp comes with ABSOLUTELY NO WARRANTY
This is free software, and you are welcome to redistribute it
under certain conditions; see the file COPYING for details
no message buffer overruns
no message buffer overruns
JACK server starting in realtime mode with priority 70
audio_reservation_init
Acquire audio card Audio0
creating alsa driver ... hw:0|-|256|2|48000|0|0|nomon|swmeter|-|32bit
Using ALSA driver HDA-Intel running on card 0 - HDA Intel at
0xf430 irq 22
configuring for 48000Hz, period = 256 frames (5.3 ms), buffer = 2
periods
ALSA: final selected sample format for playback: 32bit integer
little-endian
ALSA: use 2 periods for playback

<-- This is where I suspend and resume -->

ALSA: channel flush for playback failed (File descriptor in bad state)
JackAudioDriver::ProcessAsync: read error, skip cycle
alsa_driver_xrun_recovery
ALSA: channel flush for playback failed (File descriptor in bad state)
JackAudioDriver::ProcessAsync: read error, skip cycle

<-- This is repeated, with the lines sometimes coming in different
orders and the alsa_driver_xrun_recovery line more common than others,
until I kill jackd -->

jack main caught signal 15
alsa_driver_xrun_recovery
ALSA: channel flush for playback failed (File descriptor in bad state)
JackAudioDriver::ProcessAsync: read error, skip cycle
alsa_driver_xrun_recovery
ALSA: channel flush for playback failed (File descriptor in bad state)
JackAudioDriver::ProcessAsync: read error, skip cycle
ALSA: channel flush for playback failed (File descriptor in bad state)
Cannot stop driver
Released audio card Audio0
audio_reservation_finish
WARNING: 21760843 message buffer overruns!
[ll@innsmouth ~]$


-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (900, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.31.12-rt21-1-amd64 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages jackd2 depends on:
ii  coreutils 8.5-1  GNU core utilities
ii  debconf [debconf-2.0] 1.5.36 Debian configuration management sy
ii  libasound21.0.23-2   shared library for ALSA applicatio
ii  libc6 2.11.2-6   Embedded GNU C Library: Shared lib
ii  libcelt0-00.7.1-1The CELT codec runtime library
ii  libdbus-1-3   1.2.24-3   simple interprocess messaging syst
ii  libexpat1 2.0.1-7XML parsing C library - runtime li
ii  libgcc1   1:4.4.5-4  GCC support library
ii  libjack-jackd2-0  1.9.5~dfsg-19  JACK Audio Connection Kit (librari
ii  libncurses5   5.7+20100313-4 shared libraries for terminal hand
ii  libreadline6  6.1-3  GNU readline and history libraries
ii  libsamplerate00.1.7-3Audio sample rate conversion libra
ii  libsndfile1   1.0.21-3   Library for reading/writing audio 
ii  libstdc++64.4.5-4The GNU Standard C++ Library v3
ii  python2.6.6-3interactive high-level object-orie

Versions of packages jackd2 recommends:
ii  jackd2-firewire1.9.5~dfsg-19 JACK Audio Connection Kit (FFADO a
ii  libpam-modules 1.1.1-6   Pluggable Authentication Modules f
ii  qjackctl   0.3.6-1+b1User interface for controlling the


Processed: Bug#840836 marked as pending

2016-10-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tag 840836 pending
Bug #840836 [ardour] ardour: please point to harvid
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
840836: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840836
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers


Processing of zita-resampler_1.6.0-1_amd64.changes

2016-10-18 Thread Debian FTP Masters
zita-resampler_1.6.0-1_amd64.changes uploaded successfully to localhost
along with the files:
  zita-resampler_1.6.0-1.dsc
  zita-resampler_1.6.0.orig.tar.bz2
  zita-resampler_1.6.0-1.debian.tar.xz
  libzita-resampler-dev_1.6.0-1_amd64.deb
  libzita-resampler-doc_1.6.0-1_all.deb
  libzita-resampler1-dbgsym_1.6.0-1_amd64.deb
  libzita-resampler1_1.6.0-1_amd64.deb
  zita-resampler-dbgsym_1.6.0-1_amd64.deb
  zita-resampler_1.6.0-1_amd64.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)

___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers


Bug#839941: whishlist ffmpeg

2016-10-18 Thread Jonas Smedegaard
Hi Marc,

Quoting Struminski, Marc (2016-10-18 14:47:52)
> I thought, that you can use it free in ffmpeg, becuse the header files 
> of SDK says: The software is Provided "AS IS³Š.

I believe that expression most likely is intended not to grant you any 
freedoms, but instead to mean "don't try sue us for implicitly promising 
you that it would work for a certain use-case, and you lost millions in 
investment in a now sunken business adventure" - i.e. what we in geek 
community call "if it breaks, you get to keep both pieces".

Copyright laws in most jurisdictions obey the Berne convention, which 
requires freedoms to be explicitly stated (and that the classic phrase 
"all rights reserved" is obsolete).  Stating that it is provided "as is" 
does not rxpand to the range of freedoms defined as the Debian Free 
Software Guidelines (later adopted as the definition for the Open Source 
movement).

NB! I am not a lawyer.  My guess above is based on analyzing semantics 
of a multitude of MIT-like licenses, and then comparing what seems like 
evolutionary trends in choice of words for various parts.

Further questions about whether some code is DFSG-free or not is best 
addressed to debian-le...@lists.debian.org.


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private


signature.asc
Description: signature
___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers

Bug#839941: whishlist ffmpeg

2016-10-18 Thread Struminski, Marc

Hi,

I thought, that you can use it free in ffmpeg, becuse the header files of
SDK says: The software is Provided "AS IS³Š.

Sorry for double mailing.


Kind Regards / Mit freundlichen Grüßen
---
Marc Struminski







Am 17.10.16, 16:58 schrieb "Andreas Cadhalpun" unter
:

>Control: tags -1 upstream
>Control: retitle -1 enable decklink
>
>Hi Marc,
>
>On 17.10.2016 10:35, Struminski, Marc wrote:
>> Decklink from here: https://www.blackmagicdesign.com/de/support
>> 
>>(https://www.blackmagicdesign.com/de/support/download/197eba8afa194f03829
>>ea
>> 6fdf7d7c163/Linux) Version 1.8 Desktop Video SDK
>> 
>> Nvenc from here: https://developer.nvidia.com/nvidia-video-codec-sdk
>> 
>>(https://developer.nvidia.com/designworks/video_codec_sdk/downloads/v7.0)
>
>The nvenc page requires one to sign up a DEVELOPER PROGRAM AGREEMENT,
>while the decklink page requires accepting an EULA...
>
>In particular the decklink EULA says:
>"1.4 The Licensee must not lease, rent, distribute or sub-license the
>Software"
>
>Thus it seems to me that re-distribution of these headers is not allowed,
>no matter what license is mentioned in the files.
>(Even though it seems rather stupid to distribute a file with a
>free-software
>license header under such an EULA.)
>
>The nvenc agreement has an exception for such cases:
>"Certain Materials provided to You by NVIDIA are accompanied by a separate
>license agreement; You acknowledge and agree that such license agreement
>shall govern Your use of such Materials, in addition to this Agreement.
>You further agree that in the event of any inconsistency between this
>Agreement and the corresponding provisions in the license agreement, the
>license agreement shall govern."
>
>So it is possible to re-distribute the nvenc headers and in fact they have
>been included in the ffmpeg source repository upstream [1].
>
>The decklink EULA lacks such an exception.
>
>So if you want us to enable decklink in Debian's ffmpeg, I suggest you
>contact blackmagic and ask them for a clarification of the license for
>their headers.
>If they are in fact freely re-distributable, you can then contact ffmpeg
>upstream (ffmpeg-de...@ffmpeg.org) and ask them to include these
>headers similarly to the nvenc headers.
>
>Best regards,
>Andreas
>
>
>1: 
>https://git.videolan.org/?p=ffmpeg.git;a=commit;h=325e56479ff64c884f3bcccf
>922a7f7163488b89

___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers

Von Kevin Spiff,

2016-10-18 Thread KEVIN SPIFF
VON KEVIN SPIFF,
E-MAIL: kevin-sp...@hotmail.com

BITTE BEACHTEN UND ZU VERSTEHEN, MEIN ZIEL VON E-MAIL AN SIE HEUTE, MEIN
NAME IST KEVIN SPIFF, GESCHÄFTS RELATIONSHIP MANAGER BEI NATWEST BANK
PLC. LONDON. ICH BITTE SIE, DIESE TRANSAKTION MIT GRÖßTER
VERTRAULICHKEIT ZU PRÜFEN. ALS TOP-MANAGER BEI NATWEST BANK, ENTDECKTE
ICH EIN NUMMERNKONTO MIT EINEM GUTHABEN VON £ 12.700.000, 00 (ZWÖLF
MILLIONEN, SIEBENHUNDERTTAUSEND BRITISCHE PFUND), DIE ZU EINEM UNSERER
VERSTORBENEN KUNDEN (RENATO RIBEIRO) EINEN BRASILIANISCHEN MILLIONÄR,
DER WÄHREND GESTORBEN GEHÖRT BRASILIEN ERDRUTSCH JANUAR 2010. AUFGRUND
MEINER POSITION IN DER BANK, HABE ICH GEHEIME DETAILS UND DIE
NOTWENDIGEN KONTAKTE, DIESE MITTEL OHNE HAKEN ZU VERLANGEN. ICH BRAUCHE
NUR IHRE HILFE ALS AUSLÄNDER DEN EMPFÄNGER ZU ÜBERNEHMEN, WEIL MEINE
POSITION ALS BEAMTER UND EIN MITARBEITER DER BANK ERLAUBT ES NICHT, MICH
ODER MEINE VERWANDTEN DIESEN ANSPRUCH ZU MACHEN. DAHER MÖCHTE ICH IHNEN
ALS "FOREIGN EMPFÄNGER" ZU STEHEN, UND ICH VERSICHERE IHNEN, VON EINEM
PERFEKTEN TRANSFERSTRATEGIE IN IHREM NAMEN RECHTLICH JEDEN VERDACHT ZU
VERMEIDEN.

SIE WERDEN IN DIESEM GROßEN FINANZIELLEN ANGEBOT FÜR IHRE BETEILIGUNG
40% DER GESAMTEN SUMME VERDIENEN, NACH PRÜFUNG DIESES VORSCHLAGS, BITTE
ICH (IHR VOLLSTÄNDIGER NAME, KONTAKTADRESSE UND IHR TELEFON /
FAX-NUMMER) ZU ERMÖGLICHEN ES MIR, DEN FONDS EIN NEUES PROFIL IN IHREN
NAMEN HAT WIE DER EMPFÄNGER FÜR DIE BANK ZU LÖSEN UND DEN FONDS ZU EINEM
IHRER NOMINIERTEN BANKKONTO. IN ANBETRACHT DES VOLUMENS DER DISKRETION
FÜR DEN ERFOLG DIESES PROJEKTS ERFORDERLICH IST, BITTE ICH IHRE ANTWORT
AUF MEINE PRIVATE E-MAIL UND SIE SIND FREI, MICH AUF MEINE TELEFONNUMMER
FÜR KLARERE OBIGEN ERLÄUTERUNGEN ZU NENNEN.

ICH DANKE IHNEN IM VORGRIFF AUF IHRE SOFORTIGE ANTWORT.

MIT FREUNDLICHEN GRÜßEN,

KEVIN SPIFF,
GESCHÄFTSFÜHRER
NATWEST BANK PLC. LONDON ___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers

Laborejo

2016-10-18 Thread Alessio Treglia
Hi there,

I am no longer interested in maintaining laborejo:

   https://tracker.debian.org/pkg/laborejo

Is anyone interested in taking over? If not, I will file a orphaning bug for it.

Cheers!

-- 
Alessio Treglia  | www.alessiotreglia.com
Debian Developer | ales...@debian.org
Ubuntu Core Developer|  quadris...@ubuntu.com
0416 0004 A827 6E40 BB98 90FB E8A4 8AE5 311D 765A

___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-multimedia-maintainers