FYI: The status of the liblivemedia source package
in Debian's testing distribution has changed.
Previous version: 2018.02.18-1
Current version: 2018.02.28-1
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day
FYI: The status of the glyr source package
in Debian's testing distribution has changed.
Previous version: 1.0.9-1
Current version: 1.0.10-1
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you will receive
npapi-vlc 2.0.6-4 is marked for autoremoval from testing on 2018-03-11
It is affected by these RC bugs:
890024: npapi-vlc: upcoming Firefox ESR dropping support for NPAPI
___
pkg-multimedia-maintainers mailing list
Source: mixxx
Version: 2.0.0~dfsg-8
Please Build-Depend on scour instead of python-scour and python3-scour.
Thanks,
Jeremy Bicha
___
pkg-multimedia-maintainers mailing list
pkg-multimedia-maintainers@lists.alioth.debian.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 10 Mar 2018 11:02:34 +0100
Source: mpg123
Binary: mpg123 libmpg123-0 libout123-0 libmpg123-dev
Architecture: source
Version: 1.25.10-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 10 Mar 2018 11:02:34 +0100
Source: mpg123
Binary: mpg123 libmpg123-0 libout123-0 libmpg123-dev
Architecture: source
Version: 1.25.10-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia
mpg123_1.25.10-1_source.changes uploaded successfully to localhost
along with the files:
mpg123_1.25.10-1.dsc
mpg123_1.25.10.orig.tar.bz2
mpg123_1.25.10.orig.tar.bz2.asc
mpg123_1.25.10-1.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Processing commands for cont...@bugs.debian.org:
> found 892526 0.5.0+svn5324~dfsg1-1
Bug #892526 [src:gpac] gpac: CVE-2018-7752: Stack buffer overflow in
av_parsers.c
Marked as found in versions gpac/0.5.0+svn5324~dfsg1-1.
> thanks
Stopping processing here.
Please contact me if you need
Source: gpac
Version: 0.5.2-426-gc5ad4e4+dfsg5-3
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/gpac/gpac/issues/997
Hi,
the following vulnerability was published for gpac.
CVE-2018-7752[0]:
| GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps