libmodplug 1:0.7-5ubuntu0.6.06.1 source package in Ubuntu

Changelog

libmodplug (1:0.7-5ubuntu0.6.06.1) dapper-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution as the user via buffer
    overflows when processing crafted files with very large sample sizes
  * patch for sndfile.cpp to properly verify nLength
  * References
    CVE-2006-4192

 -- Jamie Strandboge <email address hidden>   Thu, 27 Sep 2007 14:34:04 -0400

Upload details

Uploaded by:
Jamie Strandboge
Uploaded to:
Dapper
Original maintainer:
Zed Pobre
Architectures:
any
Section:
sound
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
libmodplug_0.7.orig.tar.gz 321.7 KiB c80da366576501be18a987c28609bd8ffa340ed20fc03249c70c43634f077052
libmodplug_0.7-5ubuntu0.6.06.1.diff.gz 7.0 KiB 92f2cda909465c96a82f50c8c682f4738cffe0d10657bc1a5f43ce27d77e6c57
libmodplug_0.7-5ubuntu0.6.06.1.dsc 640 bytes 8e9ffd503875eb78771b9d34ff38716c9efd6d8184237ea37f63a3b9181a7e2e

View changes file

Binary packages built by this source

libmodplug-dev: No summary available for libmodplug-dev in ubuntu dapper.

No description available for libmodplug-dev in ubuntu dapper.

libmodplug0c2: No summary available for libmodplug0c2 in ubuntu dapper.

No description available for libmodplug0c2 in ubuntu dapper.