ardour_6.9.0+ds0-2_source.changes ACCEPTED into unstable

2022-06-30 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 30 Jun 2022 21:59:01 +0200 Source: ardour Architecture: source Version: 1:6.9.0+ds0-2 Distribution: unstable Urgency: medium Maintainer: Debian Multimedia Maintainers Changed-By: IOhannes m zmölnig (Debian/GNU)

Processing of ardour_6.9.0+ds0-2_source.changes

2022-06-30 Thread Debian FTP Masters
ardour_6.9.0+ds0-2_source.changes uploaded successfully to localhost along with the files: ardour_6.9.0+ds0-2.dsc ardour_6.9.0+ds0-2.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#1013574: marked as done (ardour: FTBFS: ../libs/backends/jack/jack_audiobackend.cc:887:21: error: ‘jack_client_stop_thread’ was not declared in this scope; did you mean ‘jack_client_create_thread’

2022-06-30 Thread Debian Bug Tracking System
Your message dated Thu, 30 Jun 2022 21:18:52 + with message-id and subject line Bug#1013574: fixed in ardour 1:6.9.0+ds0-2 has caused the Debian Bug report #1013574, regarding ardour: FTBFS: ../libs/backends/jack/jack_audiobackend.cc:887:21: error: ‘jack_client_stop_thread’ was not declared

Processed: Bug#1013574 marked as pending in ardour

2022-06-30 Thread Debian Bug Tracking System
Processing control commands: > tag -1 pending Bug #1013574 [src:ardour] ardour: FTBFS: ../libs/backends/jack/jack_audiobackend.cc:887:21: error: ‘jack_client_stop_thread’ was not declared in this scope; did you mean ‘jack_client_create_thread’? Added tag(s) pending. -- 1013574:

Processed: tagging 1014125, bug 1014125 is forwarded to https://github.com/strukturag/libheif/issues/207 ...

2022-06-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1014125 + upstream Bug #1014125 [src:libheif] libheif: CVE-2020-23109 Added tag(s) upstream. > forwarded 1014125 https://github.com/strukturag/libheif/issues/207 Bug #1014125 [src:libheif] libheif: CVE-2020-23109 Set Bug forwarded-to-address

[bts-link] source package src:synfig

2022-06-30 Thread debian-bts-link
# # bts-link upstream status pull for source package src:synfig # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html # https://bts-link-team.pages.debian.net/bts-link/ # user debian-bts-l...@lists.debian.org # remote status report for #1013460

[bts-link] source package src:libopenshot

2022-06-30 Thread debian-bts-link
# # bts-link upstream status pull for source package src:libopenshot # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html # https://bts-link-team.pages.debian.net/bts-link/ # user debian-bts-l...@lists.debian.org # remote status report for #1004763

[bts-link] source package src:audacity

2022-06-30 Thread debian-bts-link
# # bts-link upstream status pull for source package src:audacity # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html # https://bts-link-team.pages.debian.net/bts-link/ # user debian-bts-l...@lists.debian.org # remote status report for #1004598

[bts-link] source package src:handbrake

2022-06-30 Thread debian-bts-link
# # bts-link upstream status pull for source package src:handbrake # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html # https://bts-link-team.pages.debian.net/bts-link/ # user debian-bts-l...@lists.debian.org # remote status report for #1004828

Processed: [bts-link] source package src:handbrake

2022-06-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package src:handbrake > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # https://bts-link-team.pages.debian.net/bts-link/ > # > user debian-bts-l...@lists.debian.org

Bug#1014125: libheif: CVE-2020-23109

2022-06-30 Thread Moritz Mühlenhoff
Source: libheif X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for libheif. CVE-2020-23109[0]: | Buffer overflow vulnerability in function convert_colorspace in | heif_colorconversion.cc in libheif v1.6.2, allows attackers