Accepted gpac 2.0.0+dfsg1-4 (source) into unstable
- To: debian-devel-changes@lists.debian.org
- Subject: Accepted gpac 2.0.0+dfsg1-4 (source) into unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Tue, 07 Mar 2023 12:04:26 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: gpac_2.0.0+dfsg1-4_source.changes
- Debian-source: gpac
- Debian-suite: unstable
- Debian-version: 2.0.0+dfsg1-4
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=iAb1S74/XcgHjcvCGO5vLNo7Tsi9KhmqVLpnTnKwfcw=; b=R9lyZe9rXy8+Q1wmpeOXp8oXH7 pJhSgBhX1megwD0MqbNy38IROyQU8UGs8/DPNYKBJQBK06z9XExEzzamr1cjjWVf7qDz2xYaxcCSK 7M7Z7XUOwD/H/REa0qSTfPeVSyxbaXKicVU9LUZSlBDTBaaxvvJkSfibek14VDnztqe0DLFQLuYw3 k3MyHFi9MIYL1nbdqjXPH+OqllGedr4oDfbFLlv1YkcMVvWcPXEi4cuKFfji/ppUloKarM2U2xkrZ rNx40x2HTWxhSIgJHtnDwumDRsJxr5wfmn/tfUzIi2RH2TppX5qymBGn1+Fu2W8yVZYi1DkwL4vwG GYl13fqg==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1pZW3O-00DklK-9u@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 07 Mar 2023 06:41:07 -0500
Source: gpac
Architecture: source
Version: 2.0.0+dfsg1-4
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers <debian-multimedia@lists.debian.org>
Changed-By: Reinhard Tartler <siretart@tauware.de>
Closes: 1007224 1015788 1016142 1016443 1019595
Changes:
gpac (2.0.0+dfsg1-4) unstable; urgency=medium
.
* make lintian overrides backwards compatible
.
gpac (2.0.0+dfsg1-3) unstable; urgency=medium
.
* Backport security fixes for CVE-2022-29339 CVE-2022-29340
CVE-2022-29537 CVE-2022-30976 CVE-2022-1035 CVE-2022-1172
CVE-2022-1222 CVE-2022-1441 CVE-2022-1795, Closes: 1016443
* Backport more security fixes CVE-2022-2453 CVE-2022-2454,
Closes: #1015788
* Backport more security fixes CVE-2022-38530 CVE-2022-36186
CVE-2022-36190 CVE-2022-36191, Closes: #1019595
* Backport more security fixes CVE-2022-2549, closes: #1016142,
CVE-2022-26967, Closes: #1007224
* fix some lintian overrides
* update build-depends on libfreetype-dev
Checksums-Sha1:
b6c5b5d9c08e109ba5f13f5b5a282b5306aaefa5 2656 gpac_2.0.0+dfsg1-4.dsc
be3e2f904bc5a29cef57ed566d2ba0239f97dc63 44148 gpac_2.0.0+dfsg1-4.debian.tar.xz
Checksums-Sha256:
930ca15bda8f5c74350afc37e5530d92b4970bec3c6c2f67cc3e284bc8aef00f 2656 gpac_2.0.0+dfsg1-4.dsc
408d11657cbedeaefb9e72a9e3e03394c482ae990bef041f52a4f613735b88e1 44148 gpac_2.0.0+dfsg1-4.debian.tar.xz
Files:
6f651e86a4c39a5a01358de89ae1e372 2656 graphics optional gpac_2.0.0+dfsg1-4.dsc
aa25e293541c619cd4c97333004883a2 44148 graphics optional gpac_2.0.0+dfsg1-4.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=77jP
-----END PGP SIGNATURE-----