Source: sox
Version: 14.4.2+git20190427-1
Severity: important
Tags: security upstream
Forwarded: https://sourceforge.net/p/sox/bugs/325/
Hi,
The following vulnerability was published for sox.
CVE-2019-13590[0]:
| An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h
| (startread functi
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 14 Jul 2019 21:10:51 +0200
Source: wavpack
Architecture: source
Version: 5.1.0-7
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Changed-By: Sebastian Ramacher
Closes: 932060 932
Your message dated Sun, 14 Jul 2019 19:35:20 +
with message-id
and subject line Bug#932061: fixed in wavpack 5.1.0-7
has caused the Debian Bug report #932061,
regarding wavpack: CVE-2019-1010319
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is n
Your message dated Sun, 14 Jul 2019 19:35:20 +
with message-id
and subject line Bug#932060: fixed in wavpack 5.1.0-7
has caused the Debian Bug report #932060,
regarding wavpack: CVE-2019-1010317
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is n
wavpack_5.1.0-7_source.changes uploaded successfully to localhost
along with the files:
wavpack_5.1.0-7.dsc
wavpack_5.1.0-7.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Source: wavpack
Version: 5.1.0-6
Severity: important
Tags: security upstream
Forwarded: https://github.com/dbry/WavPack/issues/68
Hi,
The following vulnerability was published for wavpack.
CVE-2019-1010319[0]:
| WavPack 5.1.0 and earlier is affected by: CWE-457: Use of
| Uninitialized Variable.
Source: wavpack
Version: 5.1.0-6
Severity: important
Tags: security upstream
Forwarded: https://github.com/dbry/WavPack/issues/66
Hi,
The following vulnerability was published for wavpack.
CVE-2019-1010317[0]:
| WavPack 5.1.0 and earlier is affected by: CWE-457: Use of
| Uninitialized Variable.
7 matches
Mail list logo