Processing commands for cont...@bugs.debian.org:
> unblock 853561 by 853484 841624
Bug #853561 [src:mpd] mpd: ftbfs with GCC-7
853561 was blocked by: 853484 841624
853561 was not blocking any bugs.
Removed blocking bug(s) of 853561: 841624 and 853484
> unblock 841556 by 853484 841624
Bug #841556
libebml_1.3.4-2_source.changes uploaded successfully to localhost
along with the files:
libebml_1.3.4-2.dsc
libebml_1.3.4-2.debian.tar.xz
libebml_1.3.4-2_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Hi,
On 04/08/17 09:58, Jiong Wang wrote:
> Change
>
> "adreq lr,X(ff_h264_idct_add_neon) +CONFIG_THUMB"
>
> Into:
>
> .eqv ff_h264_idct_add_neon_without_func_type, X(ff_h264_idct_add_neon)
> adreq lr, ff_h264_idct_add_neon_without_func_type +CONFIG_THUMB
>
> might be a solution. The idea
Your message dated Sat, 5 Aug 2017 21:53:38 +0300
with message-id <20170805185338.lhvcdoxsvirzp532@localhost>
and subject line juce builds with gcc 7
has caused the Debian Bug report #853463,
regarding juce: ftbfs with GCC-7
to be marked as done.
This means that you claim that the problem has
Source: soundtouch
Version: 1.9.2-2
Severity: important
Tags: upstream security
Hi,
the following vulnerability was published for soundtouch.
CVE-2017-9260[0]:
| The TDStretchSSE::calcCrossCorr function in
| source/SoundTouch/sse_optimized.cpp in SoundTouch 1.9.2 allows remote
| attackers to
Source: soundtouch
Version: 1.9.2-2
Severity: important
Tags: security upstream
Hi,
the following vulnerability was published for soundtouch.
CVE-2017-9259[0]:
| The TDStretch::acceptNewOverlapLength function in
| source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 allows remote
| attackers to
Your message dated Sat, 05 Aug 2017 20:52:46 +
with message-id
and subject line Bug#870797: fixed in libebml 1.3.4-2
has caused the Debian Bug report #870797,
regarding libebml4v5: Please rebuild against GCC 7 to fix bug 853553
to be marked as done.
This
Hi Steve,
On 03/08/17 21:03, Steve Langasek wrote:
> Package: ffmpeg
> Version: 7:3.3.3-1
> Severity: important
> Tags: patch
> User: ubuntu-de...@lists.ubuntu.com
> Usertags: origin-ubuntu artful ubuntu-patch autopkgtest
>
> Dear maintainers,
>
> The latest release of ffmpeg enables NEON
Control: forcemerge 870622 -1
Hi James,
On Sat, Aug 05, 2017 at 02:40:12PM -0400, James Cowgill wrote:
> > The latest release of ffmpeg enables NEON support by default when building
> > on armhf; however, NEON support is not a standard part of the ARMv7 ABI, and
> > Debian supports running
Processing control commands:
> forcemerge 870622 -1
Bug #870622 [src:ffmpeg] ffmpeg: autopkgtest SIGBUS on armhf with binutils 2.29
Unable to merge bugs because:
package of #870676 is 'ffmpeg' not 'src:ffmpeg'
Failed to forcibly merge 870622: Did not alter merged bugs.
--
870622:
Processing commands for cont...@bugs.debian.org:
> reassign 870676 src:ffmpeg
Bug #870676 [ffmpeg] ffmpeg requires NEON on armhf, which is not part of the
ARMv7 ABI
Bug reassigned from package 'ffmpeg' to 'src:ffmpeg'.
No longer marked as found in versions ffmpeg/7:3.3.3-1.
Ignoring request to
Source: jaaa
Version: 0.8.4-3
Tags: patch
User: helm...@debian.org
Usertags: rebootstrap
jaaa fails to cross build from source, because its final link step hard
codes the build architecture compiler (g++) in the upstream build
system. After making that substitutable, it cross builds successfully.
Source: directfb
Version: 1.2.10.0-9
Tags: patch
User: helm...@debian.org
Usertags: rebootstrap
directfb fails to cross build from source:
| checking for directfb-csource... no
| configure: error: Could not find a directfb-csource in your PATH
It seems that for cross builds directfb expects to
Source: soundtouch
Version: 1.9.2-2
Severity: important
Tags: security upstream
Hi,
the following vulnerability was published for soundtouch. There is as
well CVE-2017-9259 and CVE-2017-9260, but since I have not verified if
the issues are all commont back to jessie, fill individual bugs. OTOH
I
Processing commands for cont...@bugs.debian.org:
> tag 870797 pending
Bug #870797 [libebml4v5] libebml4v5: Please rebuild against GCC 7 to fix bug
853553
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
870797:
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 05 Aug 2017 15:54:14 -0400
Source: libebml
Binary: libebml4v5 libebml-dev
Architecture: source
Version: 1.3.4-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
FYI: The status of the milkytracker source package
in Debian's testing distribution has changed.
Previous version: 1.0.0+dfsg-2
Current version: 1.01.00+dfsg-1
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a
FYI: The status of the calf source package
in Debian's testing distribution has changed.
Previous version: 0.0.60-4
Current version: 0.0.60-5
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you will receive
FYI: The status of the rem source package
in Debian's testing distribution has changed.
Previous version: 0.5.0-3
Current version: 0.5.1-3
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you will receive
Package: libebml4v5
Version: 1.3.4-1
Severity: normal
Dear Maintainer,
Dear Maintainer,
As explained by upstream author libebml need to be rebuilt against GCC 7
to fix mkvtoolnix build with GCC 7
See https://github.com/mbunkus/mkvtoolnix/issues/2067
Christian
-- System Information:
Debian
Source: mpg123
Version: 1.23.8-1
Severity: important
Tags: security upstream
Hi,
the following vulnerability was published for mpg123.
CVE-2017-9545[0]:
| The next_text function in src/libmpg123/id3.c in mpg123 1.24.0 allows
| remote attackers to cause a denial of service (buffer over-read) via
Source: lame
Version: 3.99.5+repack1-7
Severity: important
Tags: security upstream
Forwarded: https://sourceforge.net/p/lame/bugs/460/
Hi,
the following vulnerability was published for lame.
CVE-2017-11720[0]:
| There is a division-by-zero vulnerability in LAME 3.99.5, caused by a
| malformed
Processing commands for cont...@bugs.debian.org:
> forcemerge 853484 841624
Bug #853484 [src:libcdio] libcdio: ftbfs with GCC-7
Bug #841624 [src:libcdio] libcdio: FTBFS: ../../include/cdio/iso9660.h:277:45:
error: flexible array member 'iso9660_dir_s::filename' not at end of 'struct
Hi Dan,
On Tue, Jan 31, 2017 at 6:36 AM, Matthias Klose wrote:
> Package: src:supercollider
> Version: 1:3.7.0~repack-4
> Severity: normal
> Tags: sid buster
> User: debian-...@lists.debian.org
> Usertags: ftbfs-gcc-7
>
> The package fails to build in a test rebuild on at least
24 matches
Mail list logo