libmodplug 1:0.8.4-3ubuntu1.1 source package in Ubuntu
Changelog
libmodplug (1:0.8.4-3ubuntu1.1) jaunty-security; urgency=low * SECURITY UPDATE: code execution via integer overflow in CSoundFile::ReadMed - src/load_med.cpp: check for overflow in song comment and song name. Make sure strings are properly NULL-terminated. - http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1&r2=1.2 - http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.2&r2=1.3 - CVE-2009-1438 * SECURITY UPDATE: denial of service and possible code execution from buffer overflow in the PATinst function. - src/load_pat.cpp: use sizeof(hw.reserved) instead of a fixed size. - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms;a=commitdiff;h=c4ebb701be6ee9a296a44fdac5a20b7739ff0595 - CVE-2009-1513 -- Marc Deslauriers <email address hidden> Wed, 06 May 2009 13:47:18 -0400
Upload details
- Uploaded by:
- Marc Deslauriers
- Uploaded to:
- Jaunty
- Original maintainer:
- Ubuntu Development Team
- Architectures:
- any
- Section:
- libs
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
libmodplug_0.8.4.orig.tar.gz | 498.8 KiB | 84890249b3ecf12ef040b9121b6238248fc8da0fee948661d70375049e5131ee |
libmodplug_0.8.4-3ubuntu1.1.diff.gz | 8.5 KiB | f0c9cc0d0012544679b7f4a569871867e44903ded4447f09492eaff8fa2ecc59 |
libmodplug_0.8.4-3ubuntu1.1.dsc | 1.1 KiB | 4cdcf57eccd13677282ad6b48723f2b4a51827e3899a7eaf6643c4d6a5288ca4 |
Available diffs
Binary packages built by this source
- libmodplug-dev: No summary available for libmodplug-dev in ubuntu jaunty.
No description available for libmodplug-dev in ubuntu jaunty.
- libmodplug0c2: No summary available for libmodplug0c2 in ubuntu jaunty.
No description available for libmodplug0c2 in ubuntu jaunty.