synfig 1.4.0+dfsg-2.1 is marked for autoremoval from testing on 2022-05-10
It is affected by these RC bugs:
1007167: synfig: _clock_system.h:34:27: error: using-declaration for non-member
at class scope
https://bugs.debian.org/1007167
1008386: synfig: FTBFS: _clock_system.h:34:27: error: using-d
binary:libva-dev is NEW.
binary:libva-drm2 is NEW.
binary:libva-glx2 is NEW.
binary:libva-wayland2 is NEW.
binary:libva-x11-2 is NEW.
binary:libva2 is NEW.
binary:va-driver-all is NEW.
binary:libva-dev is NEW.
binary:libva-drm2 is NEW.
binary:libva-glx2 is NEW.
binary:libva-wayland2 is NEW.
binary:
binary:libigdgmm-dev is NEW.
binary:libigdgmm12 is NEW.
binary:libigdgmm-dev is NEW.
binary:libigdgmm12 is NEW.
source:intel-gmmlib is NEW.
Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP
intel-gmmlib_22.1.2+ds1-1~bpo11+1_amd64.changes uploaded successfully to
localhost
along with the files:
intel-gmmlib_22.1.2+ds1-1~bpo11+1.dsc
intel-gmmlib_22.1.2+ds1-1~bpo11+1.debian.tar.xz
intel-gmmlib_22.1.2+ds1-1~bpo11+1_amd64.buildinfo
libigdgmm-dev_22.1.2+ds1-1~bpo11+1_amd64.deb
li
libva_2.14.0-1~bpo11+1_amd64.changes uploaded successfully to localhost
along with the files:
libva_2.14.0-1~bpo11+1.dsc
libva_2.14.0-1~bpo11+1.debian.tar.xz
libva-dev_2.14.0-1~bpo11+1_amd64.deb
libva-drm2-dbgsym_2.14.0-1~bpo11+1_amd64.deb
libva-drm2_2.14.0-1~bpo11+1_amd64.deb
libva-glx
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 29 Apr 2022 20:31:51 -0400
Source: libyuv
Architecture: source
Version: 0.0~git20220427.de71c67-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Changed-By: Boyuan Yang
Changes:
libyuv_0.0~git20220427.de71c67-1_source.changes uploaded successfully to
localhost
along with the files:
libyuv_0.0~git20220427.de71c67-1.dsc
libyuv_0.0~git20220427.de71c67.orig.tar.gz
libyuv_0.0~git20220427.de71c67-1.debian.tar.xz
libyuv_0.0~git20220427.de71c67-1_amd64.buildinfo
Greeting
Source: sox
Version: 14.4.2+git20190427-3
Severity: important
Tags: security upstream
Forwarded: https://sourceforge.net/p/sox/bugs/351/
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerabilities were published for sox.
CVE-2021-3643[0]:
| buffer overflow read vulne
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 29 Apr 2022 07:10:17 +
Source: kodi
Architecture: source
Version: 2:19.4+dfsg2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Changed-By: Vasyl Gello
Closes: 1009278
Chang
kodi_19.4+dfsg2-1_source.changes uploaded successfully to localhost
along with the files:
kodi_19.4+dfsg2-1.dsc
kodi_19.4+dfsg2.orig-libdate-tz-embedded.tar.xz
kodi_19.4+dfsg2.orig-libdvdnav-embedded.tar.xz
kodi_19.4+dfsg2.orig-libdvdread-embedded.tar.xz
kodi_19.4+dfsg2.orig-repo-resource
Your message dated Fri, 29 Apr 2022 14:34:13 +
with message-id
and subject line Bug#1009278: fixed in kodi 2:19.4+dfsg2-1
has caused the Debian Bug report #1009278,
regarding kodi: cannot switch language in regional settings
to be marked as done.
This means that you claim that the problem has
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 29 Apr 2022 12:40:12 +
Source: kodi-inputstream-adaptive
Architecture: source
Version: 19.0.4+ds1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Changed-By: Vasyl Gello
Ch
kodi-inputstream-adaptive_19.0.4+ds1-1_source.changes uploaded successfully to
localhost
along with the files:
kodi-inputstream-adaptive_19.0.4+ds1-1.dsc
kodi-inputstream-adaptive_19.0.4+ds1.orig.tar.xz
kodi-inputstream-adaptive_19.0.4+ds1-1.debian.tar.xz
kodi-inputstream-adaptive_19.0.4+d
Processing control commands:
> tag -1 pending
Bug #1009278 [kodi] kodi: cannot switch language in regional settings
Added tag(s) pending.
--
1009278: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009278
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
14 matches
Mail list logo