Source: gpac
Version: 0.7.1+dfsg1-3
Severity: normal
Tags: security upstream
Forwarded: https://github.com/gpac/gpac/issues/1183
Hi,
The following vulnerability was published for gpac. The issue does not
affeect unstable (please double check though). Filling the bug mainly
for tracking, the versi
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 20 Sep 2019 17:42:10 +0200
Source: bs1770gain
Architecture: source
Version: 0.6.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Changed-By: Petter Reinholdtsen
Closes: 920490
bs1770gain_0.6.3-1_source.changes uploaded successfully to localhost
along with the files:
bs1770gain_0.6.3-1.dsc
bs1770gain_0.6.3.orig.tar.gz
bs1770gain_0.6.3-1.debian.tar.xz
bs1770gain_0.6.3-1_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org
Your message dated Fri, 20 Sep 2019 16:04:06 +
with message-id
and subject line Bug#920490: fixed in bs1770gain 0.6.3-1
has caused the Debian Bug report #920490,
regarding bs1770gain: Abort with "free(): invalid next size (normal)" on mp4
to be marked as done.
This means that you claim that t
4 matches
Mail list logo