Processing control commands:
> reopen -1
Bug #1051819 {Done: Nicholas D Steeves } [fluidsynth]
fluidsynth: Consider building with pipewire support
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reop
control: reopen -1
control: notfixed -1 2.3.1-2
control: severity -1 serious
control: tags -1 patch
And also a -dev dependency on the library package, as shown by autopkgtests now
being regressed (and vlc build broken).
trivial patch follows:
diff -Nru fluidsynth-2.3.3/debian/changelog fluidsy
milkytracker 1.04.00+dfsg-1 is marked for autoremoval from testing on 2023-10-04
It is affected by these RC bugs:
1051256: milkytracker: milkytracker crashes with signal 6 (double free detected
in tcache 2)
https://bugs.debian.org/1051256
This mail is generated by:
https://salsa.debian.org/re
Processing commands for cont...@bugs.debian.org:
> tags 1051889 + upstream
Bug #1051889 [src:freeimage] freeimage: CVE-2020-22524
Added tag(s) upstream.
> forwarded 1051889 https://sourceforge.net/p/freeimage/bugs/319/
Bug #1051889 [src:freeimage] freeimage: CVE-2020-22524
Set Bug forwarded-to-add
Source: libsndfile
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for libsndfile.
CVE-2022-33064[0]:
| An off-by-one error in function wav_read_header in src/wav.c in
| Libsndfile 1.1.0, results in a write out of bound, whi
Source: libsndfile
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for libsndfile.
CVE-2022-33065[0]:
| Multiple signed integers overflow in function au_read_header in
| src/au.c and in functions mat4_open and mat4_read_head
Source: faust
Version: 2.60.3+ds2-1
Severity: serious
Tags: ftbfs sid trixie
Justification: fails to build from source (but built successfully in the past)
X-Debbugs-Cc: sramac...@debian.org
https://buildd.debian.org/status/fetch.php?pkg=faust&arch=amd64&ver=2.60.3%2Bds2-1%2Bb1&stamp=1694632020&ra
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 13 Sep 2023 12:39:48 -0400
Source: easyeffects
Architecture: source
Version: 7.1.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Cha
easyeffects_7.1.0-1_source.changes uploaded successfully to localhost
along with the files:
easyeffects_7.1.0-1.dsc
easyeffects_7.1.0.orig.tar.gz
easyeffects_7.1.0-1.debian.tar.xz
easyeffects_7.1.0-1_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian
Hi. I noticed that Inkscape needs python3-pil package to be able to
export images to webp format. Unless it gives an error which says
required package "pil".
It should probably be set as dependency.
Sincerely.
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 13 Sep 2023 07:29:41 -0400
Source: soundgrain
Architecture: source
Version: 6.0.1-5
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Chan
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 13 Sep 2023 06:13:02 -0400
Source: cecilia
Architecture: source
Version: 5.4.1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Changed
soundgrain_6.0.1-5_source.changes uploaded successfully to localhost
along with the files:
soundgrain_6.0.1-5.dsc
soundgrain_6.0.1-5.debian.tar.xz
soundgrain_6.0.1-5_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Wed, 13 Sep 2023 11:52:59 +
with message-id
and subject line Bug#1047585: fixed in soundgrain 6.0.1-5
has caused the Debian Bug report #1047585,
regarding soundgrain: Fails to build source after successful build
to be marked as done.
This means that you claim that the probl
cecilia_5.4.1-2_source.changes uploaded successfully to localhost
along with the files:
cecilia_5.4.1-2.dsc
cecilia_5.4.1-2.debian.tar.xz
cecilia_5.4.1-2_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Wed, 13 Sep 2023 11:49:04 +
with message-id
and subject line Bug#1043678: fixed in cecilia 5.4.1-2
has caused the Debian Bug report #1043678,
regarding cecilia: Fails to build source after successful build
to be marked as done.
This means that you claim that the problem has
Processing control commands:
> tag -1 pending
Bug #1047585 [src:soundgrain] soundgrain: Fails to build source after
successful build
Added tag(s) pending.
--
1047585: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1047585
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Processing control commands:
> tag -1 pending
Bug #1043678 [src:cecilia] cecilia: Fails to build source after successful build
Added tag(s) pending.
--
1043678: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043678
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 13 Sep 2023 03:53:37 -0400
Source: python-pyo
Architecture: source
Version: 1.0.5-4
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Chan
python-pyo_1.0.5-4_source.changes uploaded successfully to localhost
along with the files:
python-pyo_1.0.5-4.dsc
python-pyo_1.0.5-4.debian.tar.xz
python-pyo_1.0.5-4_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Wed, 13 Sep 2023 04:21:18 -0400
with message-id <20230913082118.5472bhgg3h3ktedq@x1>
and subject line Can't reproduce, MIA reporter
has caused the Debian Bug report #994442,
regarding python3-pyo: Silently crash with 4/167 dead streams
to be marked as done.
This means that you c
On Wed, Sep 13, 2023 at 4:04 PM Sebastian Ramacher wrote:
>
> Control: reopen -1
>
> Hi,
>
> the bug was meant to keep the package out of testing as long as it is
> not maintained. Unless you are volunteering to maintain it, this bug is
> not fixed.
>
Yes, it's unfortunately auto-closed by the ch
Processing control commands:
> reopen -1
Bug #1034732 {Done: Shengjing Zhu } [gpac] Keep out of testing
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions g
Control: reopen -1
Hi,
the bug was meant to keep the package out of testing as long as it is
not maintained. Unless you are volunteering to maintain it, this bug is
not fixed.
Cheers
On 2023-09-13 07:51:07 +, Debian Bug Tracking System wrote:
> Your message dated Wed, 13 Sep 2023 07:49:09 +
Your message dated Wed, 13 Sep 2023 07:49:10 +
with message-id
and subject line Bug#1036701: fixed in gpac 2.2.1+dfsg1-2
has caused the Debian Bug report #1036701,
regarding gpac: CVE-2023-2837 CVE-2023-2838 CVE-2023-2839 CVE-2023-2840
to be marked as done.
This means that you claim that the
Your message dated Wed, 13 Sep 2023 07:49:10 +
with message-id
and subject line Bug#1034890: fixed in gpac 2.2.1+dfsg1-2
has caused the Debian Bug report #1034890,
regarding gpac: CVE-2023-0841
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is no
Your message dated Wed, 13 Sep 2023 07:49:09 +
with message-id
and subject line Bug#1034732: fixed in gpac 2.2.1+dfsg1-2
has caused the Debian Bug report #1034732,
regarding Keep out of testing
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is no
Your message dated Wed, 13 Sep 2023 07:49:09 +
with message-id
and subject line Bug#1034187: fixed in gpac 2.2.1+dfsg1-2
has caused the Debian Bug report #1034187,
regarding gpac: CVE-2023-1448 CVE-2023-1449 CVE-2023-1452 CVE-2023-1654
CVE-2023-1655
to be marked as done.
This means that you
Your message dated Wed, 13 Sep 2023 07:49:09 +
with message-id
and subject line Bug#1033116: fixed in gpac 2.2.1+dfsg1-2
has caused the Debian Bug report #1033116,
regarding gpac: CVE-2022-3222 CVE-2023-0866 CVE-2022-4202 CVE-2022-43039
CVE-2023-23143 CVE-2023-23144 CVE-2023-23145 CVE-2022-43
29 matches
Mail list logo