Bug#940855: gpac: CVE-2018-21017

2019-09-20 Thread Salvatore Bonaccorso
Source: gpac Version: 0.7.1+dfsg1-3 Severity: normal Tags: security upstream Forwarded: https://github.com/gpac/gpac/issues/1183 Hi, The following vulnerability was published for gpac. The issue does not affeect unstable (please double check though). Filling the bug mainly for tracking, the versi

bs1770gain_0.6.3-1_source.changes ACCEPTED into unstable

2019-09-20 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 20 Sep 2019 17:42:10 +0200 Source: bs1770gain Architecture: source Version: 0.6.3-1 Distribution: unstable Urgency: medium Maintainer: Debian Multimedia Maintainers Changed-By: Petter Reinholdtsen Closes: 920490

Processing of bs1770gain_0.6.3-1_source.changes

2019-09-20 Thread Debian FTP Masters
bs1770gain_0.6.3-1_source.changes uploaded successfully to localhost along with the files: bs1770gain_0.6.3-1.dsc bs1770gain_0.6.3.orig.tar.gz bs1770gain_0.6.3-1.debian.tar.xz bs1770gain_0.6.3-1_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org

Bug#920490: marked as done (bs1770gain: Abort with "free(): invalid next size (normal)" on mp4)

2019-09-20 Thread Debian Bug Tracking System
Your message dated Fri, 20 Sep 2019 16:04:06 + with message-id and subject line Bug#920490: fixed in bs1770gain 0.6.3-1 has caused the Debian Bug report #920490, regarding bs1770gain: Abort with "free(): invalid next size (normal)" on mp4 to be marked as done. This means that you claim that t