Change log for libmodplug package in Ubuntu

137 of 37 results
Published in wily-proposed on 2015-06-01
libmodplug (1:0.8.8.5-1) unstable; urgency=medium

  * New upstream version
  * Add build-arch and build-indep targets to debian/rules
  * Add debian/watch file
  * Explicitly depend on Debhelper >= 9
  * Move Homepage entry from binaries to source
  * Switch dh_clean -k to dh_prep
  * Remove rendundant Section entry from libmodplug1 binary control area
  * Use new canonical anonscm.debian.org Vcs-Git location

 -- Zed Pobre <email address hidden>  Mon, 01 Jun 2015 15:12:24 -0400
Published in wily-release on 2015-05-04
Published in vivid-release on 2014-10-23
Published in utopic-release on 2014-04-23
Published in trusty-release on 2014-04-10
Deleted in trusty-proposed (Reason: moved to release)
libmodplug (1:0.8.8.4-4.1) unstable; urgency=medium


  * Non-maintainer upload.
  * debian/control: Switch to automake1.11. (Closes: #724407)

 -- Eric Dorland <email address hidden>  Sat, 08 Mar 2014 17:32:36 -0500

Available diffs

Superseded in trusty-release on 2014-04-10
Obsolete in saucy-release on 2015-04-24
Deleted in saucy-proposed on 2015-04-28 (Reason: moved to release)
libmodplug (1:0.8.8.4-4) unstable; urgency=high


    * Merge all changes from latest upstream Git repository (0.8.8.4 with
      additional patches), including the following security changes:
      * CVE-2013-4233: fix integer overflow in load_abc.cpp
      * CVE-2013-4234: fix heap overflows in abc_MIDI_drum and abc_MIDI_gchord
      * Closes: #719642
    * Standards-Version: 3.9.4
      * Added Vcs-Git and Vcs-Browser entries

 -- Zed Pobre <email address hidden>  Mon, 02 Sep 2013 22:31:46 -0400

Available diffs

Superseded in saucy-release on 2013-09-05
Obsolete in raring-release on 2015-04-24
Obsolete in quantal-release on 2015-04-24
libmodplug (1:0.8.8.4-3) unstable; urgency=low


  * Fix missing backslash on dpkg-buildflags line (closes: #654817)

 -- Zed Pobre <email address hidden>  Mon, 09 Apr 2012 11:44:45 -0400

Available diffs

Obsolete in oneiric-updates on 2015-04-24
Obsolete in oneiric-security on 2015-04-24
libmodplug (1:0.8.8.2-3ubuntu1.1) oneiric-security; urgency=low

  * SECURITY UPDATE: integer overflow in CSoundFile::ReadWav()
    - properly calculate length in src/load_wav.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=2d4c56de314ab13e4437bd8b609f0b751066eee8
    - CVE-2011-2911
  * SECURITY UPDATE: boundary error in CSoundFile::ReadS3M()
    - validate offsets and ignore duplicate samples in src/load_s3m.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=4e5295658fff000379caa122e75c9200205fe20
    - CVE-2011-2912
  * SECURITY UPDATE: off-by-one in CSoundFile::ReadAMS()
    - fix calculation in src/load_ams.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef
    - CVE-2011-2913
  * SECURITY UPDATE: off-by-one in CSoundFile::ReadDSM()
    - fix calculation in src/load_dsm.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef
    - CVE-2011-2914
  * SECURITY UPDATE: off-by-one in CSoundFile::ReadAMS2()
    - fix calculation in src/load_ams.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=16d7a78efe14d345a6c5b241f88422ad0ee483ea
    - CVE-2011-2915
 -- Marc Deslauriers <email address hidden>   Fri, 14 Oct 2011 13:28:14 -0400
Obsolete in natty-updates on 2013-06-04
Obsolete in natty-security on 2013-06-04
libmodplug (1:0.8.8.1-2ubuntu0.3) natty-security; urgency=low

  * SECURITY UPDATE: integer overflow in CSoundFile::ReadWav()
    - properly calculate length in src/load_wav.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=2d4c56de314ab13e4437bd8b609f0b751066eee8
    - CVE-2011-2911
  * SECURITY UPDATE: boundary error in CSoundFile::ReadS3M()
    - validate offsets and ignore duplicate samples in src/load_s3m.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=4e5295658fff000379caa122e75c9200205fe20
    - CVE-2011-2912
  * SECURITY UPDATE: off-by-one in CSoundFile::ReadAMS()
    - fix calculation in src/load_ams.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef
    - CVE-2011-2913
  * SECURITY UPDATE: off-by-one in CSoundFile::ReadDSM()
    - fix calculation in src/load_dsm.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef
    - CVE-2011-2914
  * SECURITY UPDATE: off-by-one in CSoundFile::ReadAMS2()
    - fix calculation in src/load_ams.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=16d7a78efe14d345a6c5b241f88422ad0ee483ea
    - CVE-2011-2915
 -- Marc Deslauriers <email address hidden>   Fri, 14 Oct 2011 13:42:09 -0400
Obsolete in maverick-updates on 2013-03-05
Obsolete in maverick-security on 2013-03-05
libmodplug (1:0.8.8.1-1ubuntu1.3) maverick-security; urgency=low

  * SECURITY UPDATE: integer overflow in CSoundFile::ReadWav()
    - properly calculate length in src/load_wav.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=2d4c56de314ab13e4437bd8b609f0b751066eee8
    - CVE-2011-2911
  * SECURITY UPDATE: boundary error in CSoundFile::ReadS3M()
    - validate offsets and ignore duplicate samples in src/load_s3m.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=4e5295658fff000379caa122e75c9200205fe20
    - CVE-2011-2912
  * SECURITY UPDATE: off-by-one in CSoundFile::ReadAMS()
    - fix calculation in src/load_ams.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef
    - CVE-2011-2913
  * SECURITY UPDATE: off-by-one in CSoundFile::ReadDSM()
    - fix calculation in src/load_dsm.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef
    - CVE-2011-2914
  * SECURITY UPDATE: off-by-one in CSoundFile::ReadAMS2()
    - fix calculation in src/load_ams.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=16d7a78efe14d345a6c5b241f88422ad0ee483ea
    - CVE-2011-2915
 -- Marc Deslauriers <email address hidden>   Fri, 14 Oct 2011 13:43:02 -0400
Published in lucid-updates on 2011-11-09
Published in lucid-security on 2011-11-09
libmodplug (1:0.8.7-1ubuntu0.3) lucid-security; urgency=low

  * SECURITY UPDATE: integer overflow in CSoundFile::ReadWav()
    - properly calculate length in src/load_wav.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=2d4c56de314ab13e4437bd8b609f0b751066eee8
    - CVE-2011-2911
  * SECURITY UPDATE: boundary error in CSoundFile::ReadS3M()
    - validate offsets and ignore duplicate samples in src/load_s3m.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=4e5295658fff000379caa122e75c9200205fe20
    - CVE-2011-2912
  * SECURITY UPDATE: off-by-one in CSoundFile::ReadAMS()
    - fix calculation in src/load_ams.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef
    - CVE-2011-2913
  * SECURITY UPDATE: off-by-one in CSoundFile::ReadDSM()
    - fix calculation in src/load_dsm.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef
    - CVE-2011-2914
  * SECURITY UPDATE: off-by-one in CSoundFile::ReadAMS2()
    - fix calculation in src/load_ams.cpp.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=16d7a78efe14d345a6c5b241f88422ad0ee483ea
    - CVE-2011-2915
 -- Marc Deslauriers <email address hidden>   Fri, 14 Oct 2011 13:44:03 -0400
Superseded in quantal-release on 2012-05-01
Published in precise-release on 2011-11-16
Superseded in precise-release on 2011-11-16
libmodplug (1:0.8.8.4-1) unstable; urgency=high


  * New upstream version
    * Fixes buffer overflow in load_abc (CVE-2011-1761, closes: #625966)
    * Fixes integer overflow in load_wav (SA45131.1)
    * Fixes stack overflow in load_s3m (SA45131.2)
    * Fixes off-by-one errors in load_ams and load_dms that can cause
      stack and memory corruption (SA45131.3-5)
  * Added a few lines to the package description describing what mod
    music is.  (closes: #637854)
  * Allow CC and CXX to contain spaces in debian/rules (closes: #636863)
  * Standards-Version: 3.9.2

 -- Zed Pobre <email address hidden>  Mon, 05 Sep 2011 19:21:47 -0400
Superseded in precise-release on 2011-11-08
Obsolete in oneiric-release on 2015-04-24
libmodplug (1:0.8.8.2-3ubuntu1) oneiric; urgency=low

  * SECURITY UPDATE: multiple security issues in ABC loader
    - src/load_abc.cpp: fix various issues.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=d7c36959757fc6c8e4d487be8a72383093d9d26f
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=5d437ad2f741c08fc3862cd4d5157492ead0fe84
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=a13e067a82fa195b1732ad9fb8341c1b0f141bf5
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=22aa681cd12f8547a8866112c7e443166115b701
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=bd5363f31274d6e79b8ace5a94686c9ac6ef415b
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=51f4b152060be23a4514da2a65c83e205bfb21ba
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=56436fac0a37b1746dab594e4aefba9d2bb92e09
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=ad305187322171eab3a66f4b5ce2a067b1580b3e
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=497a27ba2555399d7aa243dbb51ca81e4e7a32cf
    - CVE-2011-1761
 -- Marc Deslauriers <email address hidden>   Fri, 05 Aug 2011 11:06:52 -0400
Superseded in lucid-updates on 2011-11-09
Superseded in lucid-security on 2011-11-09
libmodplug (1:0.8.7-1ubuntu0.2) lucid-security; urgency=low

  * SECURITY UPDATE: buffer overflow in S3M loader
    - src/load_s3m.cpp: ignore corrupted headers.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=aecef259828a89bb00c2e6f78e89de7363b2237b
    - CVE-2011-1574
  * SECURITY UPDATE: multiple security issues in ABC loader
    - src/load_abc.cpp: fix various issues.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=d7c36959757fc6c8e4d487be8a72383093d9d26f
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=5d437ad2f741c08fc3862cd4d5157492ead0fe84
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=a13e067a82fa195b1732ad9fb8341c1b0f141bf5
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=22aa681cd12f8547a8866112c7e443166115b701
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=bd5363f31274d6e79b8ace5a94686c9ac6ef415b
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=51f4b152060be23a4514da2a65c83e205bfb21ba
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=56436fac0a37b1746dab594e4aefba9d2bb92e09
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=ad305187322171eab3a66f4b5ce2a067b1580b3e
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=497a27ba2555399d7aa243dbb51ca81e4e7a32cf
    - CVE-2011-1761
 -- Marc Deslauriers <email address hidden>   Mon, 13 Jun 2011 10:14:19 -0400
Superseded in maverick-updates on 2011-11-09
Superseded in maverick-security on 2011-11-09
libmodplug (1:0.8.8.1-1ubuntu1.2) maverick-security; urgency=low

  * SECURITY UPDATE: buffer overflow in S3M loader
    - src/load_s3m.cpp: ignore corrupted headers.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=aecef259828a89bb00c2e6f78e89de7363b2237b
    - CVE-2011-1574
  * SECURITY UPDATE: multiple security issues in ABC loader
    - src/load_abc.cpp: fix various issues.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=d7c36959757fc6c8e4d487be8a72383093d9d26f
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=5d437ad2f741c08fc3862cd4d5157492ead0fe84
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=a13e067a82fa195b1732ad9fb8341c1b0f141bf5
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=22aa681cd12f8547a8866112c7e443166115b701
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=bd5363f31274d6e79b8ace5a94686c9ac6ef415b
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=51f4b152060be23a4514da2a65c83e205bfb21ba
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=56436fac0a37b1746dab594e4aefba9d2bb92e09
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=ad305187322171eab3a66f4b5ce2a067b1580b3e
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=497a27ba2555399d7aa243dbb51ca81e4e7a32cf
    - CVE-2011-1761
 -- Marc Deslauriers <email address hidden>   Mon, 13 Jun 2011 10:11:44 -0400
Superseded in natty-updates on 2011-11-09
Superseded in natty-security on 2011-11-09
libmodplug (1:0.8.8.1-2ubuntu0.2) natty-security; urgency=low

  * SECURITY UPDATE: buffer overflow in S3M loader
    - src/load_s3m.cpp: ignore corrupted headers.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=aecef259828a89bb00c2e6f78e89de7363b2237b
    - CVE-2011-1574
  * SECURITY UPDATE: multiple security issues in ABC loader
    - src/load_abc.cpp: fix various issues.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=d7c36959757fc6c8e4d487be8a72383093d9d26f
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=5d437ad2f741c08fc3862cd4d5157492ead0fe84
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=a13e067a82fa195b1732ad9fb8341c1b0f141bf5
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=22aa681cd12f8547a8866112c7e443166115b701
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=bd5363f31274d6e79b8ace5a94686c9ac6ef415b
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=51f4b152060be23a4514da2a65c83e205bfb21ba
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=56436fac0a37b1746dab594e4aefba9d2bb92e09
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=ad305187322171eab3a66f4b5ce2a067b1580b3e
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=497a27ba2555399d7aa243dbb51ca81e4e7a32cf
    - CVE-2011-1761
 -- Marc Deslauriers <email address hidden>   Mon, 13 Jun 2011 10:10:45 -0400
Superseded in oneiric-release on 2011-08-05
libmodplug (1:0.8.8.2-3) unstable; urgency=medium

  * Remove redundant AM_SILENT_RULES macro outside of the ifdef to
    prevent breaking builds on many platforms (closes: #624403)

Available diffs

Superseded in oneiric-release on 2011-04-30
Obsolete in natty-release on 2013-06-04
libmodplug (1:0.8.8.1-2) unstable; urgency=low

  * libmodplug-dev no longer depends on libstdc++-dev (which should have
    been unnecessary since the move of -lstdc++ to Libs.private in
    0.8.4-2).

    Closes: #596463
  * Standards-Version: 3.9.1 (no changes needed)
 -- Bhavani Shankar <email address hidden>   Fri,  22 Oct 2010 15:30:53 +0000

Available diffs

Superseded in natty-release on 2010-10-22
Obsolete in maverick-release on 2013-03-05
libmodplug (1:0.8.8.1-1ubuntu1) maverick; urgency=low

  * Drop the dependency on libstdc++6-4.3-dev.
 -- Matthias Klose <email address hidden>   Sat, 11 Sep 2010 20:29:26 +0200

Available diffs

Superseded in maverick-release on 2010-09-11
libmodplug (1:0.8.8.1-1) unstable; urgency=high

  * New upstream version
    * 0.8.8 introduced an ABI change without updating the major version.
      This was causing potential problems in clients linked against
      libmodplug0c2, including silence.

      This version changes the binary package from libmodplug0c2 to
      libmodplug1, so all related applications will have to be
      recompiled to use a version greater than is in Lenny (0.8.4).

      Closes: #588465
  * debian/copyright updated with additional contributors and the license
    description properly set to public domain
 -- Benjamin Drung <email address hidden>   Sun, 18 Jul 2010 21:25:08 -0400

Available diffs

Superseded in maverick-release on 2010-07-31
libmodplug (1:0.8.8-2) unstable; urgency=low

  * Capitalize "Windows" in long descriptions (closes: #586114)
 -- Ubuntu Archive Auto-Sync <email address hidden>   Sun,  20 Jun 2010 09:07:05 +0100

Available diffs

Superseded in maverick-release on 2010-06-20
libmodplug (1:0.8.8-1) unstable; urgency=high

  * New upstream version
    * Fix 32 to 32 bit "downsampling" on 64bit platforms. (Closes: #585699)
      * The above bug is causing crashes in the Gnome file browser during
        previews, thus urgency is set to high.
    * Fix usage of bigendian in include files
    * Fix PSM files on bigendian computers
    * Allow configuration of Stereo Seperation and MaxMixChannels
    * Fix possible problem with misaligned data structure when converting
      to int32 (load_669)
  * Added AC_PROG_LIBTOOL to configure.in to allow libtool during rebuild
  * Added real package alternative dependency for libstdc++-dev
  * Standards-Version: 3.8.4 (no changes required)
  * Added misc:Depends to dependencies
 -- Ubuntu Archive Auto-Sync <email address hidden>   Mon,  14 Jun 2010 09:49:27 +0100

Available diffs

Superseded in maverick-release on 2010-06-14
Published in lucid-release on 2010-03-06
libmodplug (1:0.8.7-1build1) lucid; urgency=low

  * rebuild rest of main for armel armv7/thumb2 optimization;
    UbuntuSpec:mobile-lucid-arm-gcc-v7-thumb2
 -- Alexander Sack <email address hidden>   Sat, 06 Mar 2010 13:35:27 +0100

Available diffs

Superseded in lucid-release on 2010-03-06
Obsolete in karmic-release on 2013-03-04
libmodplug (1:0.8.7-1) unstable; urgency=high

  * New upstream version
    * Fixes integer overflow in CSoundFile::ReadMed (CVE-2009-1438)
      (closes: #526657)
    * Fixes PATinst() Buffer Overflow (SA34927) (closes: #526084)
    * Fixes 24/32-bit conversion routine

Available diffs

Obsolete in intrepid-updates on 2013-02-20
Obsolete in intrepid-security on 2013-02-20
libmodplug (1:0.7-7ubuntu0.8.10.1) intrepid-security; urgency=low

  * SECURITY UPDATE: code execution via integer overflow in
    CSoundFile::ReadMed
    - src/load_med.cpp: check for overflow in song comment and song name.
      Make sure strings are properly NULL-terminated.
    - http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1&amp;r2=1.2
    - http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.2&r2=1.3
    - CVE-2009-1438
  * Fix FTBFS
    - debian/rules: add -i to libtoolize.

 -- Marc Deslauriers <email address hidden>   Wed, 06 May 2009 14:26:33 -0400
Obsolete in jaunty-updates on 2013-02-28
Obsolete in jaunty-security on 2013-02-28
libmodplug (1:0.8.4-3ubuntu1.1) jaunty-security; urgency=low

  * SECURITY UPDATE: code execution via integer overflow in
    CSoundFile::ReadMed
    - src/load_med.cpp: check for overflow in song comment and song name.
      Make sure strings are properly NULL-terminated.
    - http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1&amp;r2=1.2
    - http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.2&r2=1.3
    - CVE-2009-1438
  * SECURITY UPDATE: denial of service and possible code execution from
    buffer overflow in the PATinst function.
    - src/load_pat.cpp: use sizeof(hw.reserved) instead of a fixed size.
    - http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms;a=commitdiff;h=c4ebb701be6ee9a296a44fdac5a20b7739ff0595
    - CVE-2009-1513

 -- Marc Deslauriers <email address hidden>   Wed, 06 May 2009 13:47:18 -0400
Obsolete in hardy-updates on 2015-04-24
Obsolete in hardy-security on 2015-04-24
libmodplug (1:0.7-7ubuntu0.8.04.1) hardy-security; urgency=low

  * SECURITY UPDATE: code execution via integer overflow in
    CSoundFile::ReadMed
    - src/load_med.cpp: check for overflow in song comment and song name.
      Make sure strings are properly NULL-terminated.
    - http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1&amp;r2=1.2
    - http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.2&r2=1.3
    - CVE-2009-1438

 -- Marc Deslauriers <email address hidden>   Wed, 06 May 2009 15:34:51 -0400
Obsolete in dapper-updates on 2011-09-06
Obsolete in dapper-security on 2011-09-06
libmodplug (1:0.7-5ubuntu0.6.06.2) dapper-security; urgency=low

  * SECURITY UPDATE: code execution via integer overflow in
    CSoundFile::ReadMed
    - src/load_med.cpp: check for overflow in song comment and song name.
      Make sure strings are properly NULL-terminated.
    - http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1&amp;r2=1.2
    - http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.2&r2=1.3
    - CVE-2009-1438

 -- Marc Deslauriers <email address hidden>   Wed, 06 May 2009 15:45:23 -0400
Superseded in karmic-release on 2009-05-14
Obsolete in jaunty-release on 2013-02-28
libmodplug (1:0.8.4-3ubuntu1) jaunty; urgency=low

  * debian/rules: Call libtoolize with -f -i.

 -- Matthias Klose <email address hidden>   Tue, 18 Nov 2008 18:53:24 +0100

Available diffs

Superseded in jaunty-release on 2008-11-18
libmodplug (1:0.8.4-3) unstable; urgency=low

  * Switch automake dependency back to just automake, pull versioned usage
    of automake/aclocal. (closes: #506020)

 -- Ubuntu Archive Auto-Sync <email address hidden>   Tue,  18 Nov 2008 10:35:25 +0000

Available diffs

Superseded in jaunty-release on 2008-11-18
libmodplug (1:0.8.4-2) unstable; urgency=low

  * Use Libs.private in libmodplug.pc for -lstdc++ -lm to avoid certain
    build failure cases. (closes: #457278, #360248)
  * Slight improvement to debian/rules clean
  * Force automake to v1.9
  * Add copyright notice to debian/copyright
  * Thanks to Steve Langasek for the long-standing patch covering the above.
  * Move homepage information out of Description and into Homepage field.
  * Add Section: libs to source package in debian/control
  * Standards-Version: 3.8.0

Available diffs

Superseded in jaunty-release on 2008-11-05
Obsolete in intrepid-release on 2013-02-20
Obsolete in hardy-release on 2015-04-24
libmodplug (1:0.7-7) unstable; urgency=low

  * Debhelper compatibility level 5, using debian/compat
  * use both >= and << for source:Version for the -dev package, to
    properly handle binNMU safety (closes: #437489)
  * Build-Depends: autotools-dev.  Also sort build-depends packages
    alphabetically.
  * Standards-Version 3.7.2.2 (no changes required)

Obsolete in edgy-updates on 2008-06-19
Obsolete in edgy-security on 2008-06-19
libmodplug (1:0.7-5ubuntu0.6.10.1) edgy-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution as the user via buffer
    overflows when processing crafted files with very large sample sizes
  * patch for sndfile.cpp to properly verify nLength
  * References
    CVE-2006-4192

 -- Jamie Strandboge <email address hidden>   Thu, 27 Sep 2007 13:54:14 -0400
Superseded in dapper-updates on 2009-05-07
Superseded in dapper-security on 2009-05-07
libmodplug (1:0.7-5ubuntu0.6.06.1) dapper-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution as the user via buffer
    overflows when processing crafted files with very large sample sizes
  * patch for sndfile.cpp to properly verify nLength
  * References
    CVE-2006-4192

 -- Jamie Strandboge <email address hidden>   Thu, 27 Sep 2007 14:34:04 -0400
Superseded in hardy-release on 2007-11-29
Obsolete in gutsy-release on 2011-09-16
libmodplug (1:0.7-5.2ubuntu1) gutsy; urgency=low

  [ Stefan Skotte ]
  * Change debian/rules to run automake1.9 as specified in build-deps
    not default automake

 -- Jonathan Riddell <email address hidden>   Sat, 11 Aug 2007 13:27:14 +0100
Superseded in gutsy-release on 2007-08-11
Obsolete in feisty-release on 2009-08-20
libmodplug (1:0.7-5.2build1) feisty; urgency=low

  * Rebuild for changes in the amd64 toolchain.

 -- Matthias Klose <email address hidden>   Mon,  5 Mar 2007 01:20:58 +0000
Superseded in feisty-release on 2007-03-05
libmodplug (1:0.7-5.2) unstable; urgency=medium

  * Non-maintainer upload.
  * Check for very large sample sizes that could create overflows, enabling an
    attacker to allocate zero bytes and possibly execute arbitrary codes as
    the user [CVE-2006-4192]. (Closes: #383574)
  * Run aclocal-1.9 instead of aclocal, as automake1.9 doesn't provide the
    latter; fixes FTBFS.

Superseded in feisty-release on 2006-11-08
Obsolete in edgy-release on 2008-06-19
Obsolete in dapper-release on 2011-09-06
Superseded in dapper-release on 2006-02-03
libmodplug (1:0.7-5) unstable; urgency=low


  * Official build, acknowledging NMU, and closing out the bugs
    (closes: #318392, #318994)
  * Standards-Version: 3.6.2.0 (no changes required)

 -- Zed Pobre <email address hidden>  Fri, 19 Aug 2005 18:13:54 -0500
Obsolete in breezy-release on 2008-03-25
libmodplug (1:0.7-4.1) unstable; urgency=medium


  * Non-maintainer upload.
  * Medium-urgency upload for RC bugfix.
  * Rebuild against g++-4.0 for the C++ ABI transition, renaming
    libmodplug0 to libmodplug0c2 and conflicting with libmodplug0.

 -- Steve Langasek <email address hidden>  Mon, 18 Jul 2005 19:10:24 -0700
Obsolete in hoary-release on 2008-03-19
libmodplug (1:0.7-3) unstable; urgency=low


  * Acknowledge NMU. (closes: #267204)
  * Fixed Makefile.in locations in clean: target.
  * Changed "copyright" to "license" when describing the license in
    debian/copyright.
  * Make the shlibs force a version >= 1:0.7-1 to be safe.

 -- Zed Pobre <email address hidden>  Fri, 10 Sep 2004 14:05:53 -0500
137 of 37 results