Your message dated Sat, 14 Nov 2020 03:48:28 +0000 with message-id <E1kdmY8-000AdQ-Kv@fasolo.debian.org> and subject line Bug#817194: fixed in gpac 0.7.1+dfsg1-4 has caused the Debian Bug report #817194, regarding gpac: new upstream version and moved to github to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 817194: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817194 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: gpac: new upstream version and moved to github
- From: Sebastian Ramacher <sramacher@debian.org>
- Date: Tue, 8 Mar 2016 23:04:18 +0100
- Message-id: <20160308220418.GA11900@ramacher.at>
Source: gpac Version: 0.5.2-426-gc5ad4e4+dfsg5-1 Severity: wishlist A new upstream version is available (0.6.0): https://github.com/gpac/gpac/releases/tag/v0.6.0. Development also moved to github, so the watch file needs an update. Cheers -- Sebastian RamacherAttachment: signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
- To: 817194-close@bugs.debian.org
- Subject: Bug#817194: fixed in gpac 0.7.1+dfsg1-4
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sat, 14 Nov 2020 03:48:28 +0000
- Message-id: <E1kdmY8-000AdQ-Kv@fasolo.debian.org>
- Reply-to: Reinhard Tartler <siretart@tauware.de>
Source: gpac Source-Version: 0.7.1+dfsg1-4 Done: Reinhard Tartler <siretart@tauware.de> We believe that the bug you reported is fixed in the latest version of gpac, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 817194@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Reinhard Tartler <siretart@tauware.de> (supplier of updated gpac package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 13 Nov 2020 21:27:34 -0500 Source: gpac Architecture: source Version: 0.7.1+dfsg1-4 Distribution: unstable Urgency: medium Maintainer: Debian Multimedia Maintainers <debian-multimedia@lists.debian.org> Changed-By: Reinhard Tartler <siretart@tauware.de> Closes: 817194 892526 902782 921969 926961 926963 945200 Changes: gpac (0.7.1+dfsg1-4) unstable; urgency=medium . [ Debian Janitor ] * Use secure URI in Homepage field. * Bump debhelper from old 9 to 10. * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository, Repository-Browse. * Drop unnecessary dh arguments: --parallel . [ Reinhard Tartler ] * upload to unstable * libgpac7.symbols: Add Build-Depends-Package field * debian/changelog: cleanups * Fix FTCBFS: Pass --cross-prefix to ./configure, Closes: #945200 Thanks to Helmut Grohne <helmut@subdivi.de> for providing the patch . gpac (0.7.1+dfsg1-3) experimental; urgency=medium . * Merge security patches from unstable Closes: #926961, Closes: #926963 . gpac (0.7.1+dfsg1-2) experimental; urgency=medium . * Upload to experimental and mark the previous upload as UNRELEASED. It was deemed unappropriate for this stage of the Debian Release cycle. . gpac (0.7.1+dfsg1-1) UNRELEASED; urgency=medium . [ Balint Reczey ] * Remove myself from Uploaders . [ Reinhard Tartler ] * Update exclude lists * New upstream version 0.7.1+dfsg1 (Closes: #817194) * Add bugfix for CVE-2018-7752 (Closes: #892526) * Add patch for CVE-2018-20760, CVE-2018-20762, CVE-2018-20763 (CVE-2018-20761 does not need addressing) (Closes: #921969) * add patch for CVE-2018-13005, CVE-2018-13006 (Closes: #902782) Checksums-Sha1: 57ab89bd70336e63657106ea89a068a255b35266 2699 gpac_0.7.1+dfsg1-4.dsc b92f9b1fdebd20c6184c1424403d877a222046eb 45604 gpac_0.7.1+dfsg1-4.debian.tar.xz Checksums-Sha256: 7f32a6f6d6be66a3428d3fd4f223195b9e1deea69cd8b0ee86155fedd6419bb6 2699 gpac_0.7.1+dfsg1-4.dsc 2416dd68daa824122039a302ff8ff9167daf5a68ac83a282ff28f6cb98d11b58 45604 gpac_0.7.1+dfsg1-4.debian.tar.xz Files: 2ff17e6586dff41df35e39b6686df5e7 2699 graphics optional gpac_0.7.1+dfsg1-4.dsc 49e6ed6dab2b59bd426d1bc540e455bb 45604 graphics optional gpac_0.7.1+dfsg1-4.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQJIBAEBCgAyFiEEMN59F2OrlFLH4IJQSadpd5QoJssFAl+vT0MUHHNpcmV0YXJ0 QHRhdXdhcmUuZGUACgkQSadpd5QoJstf+Q/+LUICgkxkfQ4wh76BeN0+g3nvhDdL EG2uaxmThNePFNiR8i+SHJc6qWe9FVtfrm4jMy0I0EtZIu5S2RqT9qp03K7usB6K 24/jYNd8YiwgKb6q1p2Hps+Q4QbTX8izp8XDxuVtg6bIXd7Xf99g+yv62GaFh2wS hexATJtz5ebzcOZVeQrZ/ZGBt/YOf/i4svfUQCb/t3PtiHJTNSqNbhYXOFs752pi +RJ/mbtdJHIyqZ9qIFM2hDZei7JTq6htJ/asR7XIr/hFHsjOrLhZmK9KOhPkTo+D Uy7VN/WNmD4G0NmYETX3QubdcYFOcYemJuFVQ8FzC7zJUTDVwEmOQGbe71RXSAZ0 DWgebN0RwuPhcBwQJYVl3fZM+qWnia+av9dqGF4gCRptm74Tm6vDSegrtxZN9ahy EIMWJ3O720mejzB9c0nWLLJXM10jajVSgPioogmzdtP29YGFv4VvMAMFLK+81ERL h0C2WZKYroQNyGcnY2beTaJ1S1sRziSx3QGyFchRaJmNpAddeGfalzw2KnkJkM6a jgf8nslDWTrMLZm6cqvNHtODzPxG4iIKljqv50DaRfvR4okPL8M2F3vSGQ6frIfr 6qngDS4ZZg/FC/cLfwVpKbwQfw4/JAkLygAWOYi9AO+kYR0KqW8yqH4RQE4wnNcR MY5CJC15bTa62LE= =90B0 -----END PGP SIGNATURE-----
--- End Message ---