libmodplug 1:0.7-5ubuntu0.6.10.1 source package in Ubuntu

Changelog

libmodplug (1:0.7-5ubuntu0.6.10.1) edgy-security; urgency=low

  * SECURITY UPDATE: possible arbitrary code execution as the user via buffer
    overflows when processing crafted files with very large sample sizes
  * patch for sndfile.cpp to properly verify nLength
  * References
    CVE-2006-4192

 -- Jamie Strandboge <email address hidden>   Thu, 27 Sep 2007 13:54:14 -0400

Upload details

Uploaded by:
Jamie Strandboge
Uploaded to:
Edgy
Original maintainer:
Zed Pobre
Architectures:
any
Section:
sound
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
libmodplug_0.7.orig.tar.gz 321.7 KiB c80da366576501be18a987c28609bd8ffa340ed20fc03249c70c43634f077052
libmodplug_0.7-5ubuntu0.6.10.1.diff.gz 7.0 KiB af8051caf9d8b664fa59e51a1f433c22c2d1832c470f72c5ad2db84221c87c52
libmodplug_0.7-5ubuntu0.6.10.1.dsc 640 bytes 3a82865f3eaa48dbbfff47d6d96a36cd98aa50d971335d890ea9b0f48fd7a1b6

View changes file

Binary packages built by this source

libmodplug-dev: No summary available for libmodplug-dev in ubuntu edgy.

No description available for libmodplug-dev in ubuntu edgy.

libmodplug0c2: No summary available for libmodplug0c2 in ubuntu edgy.

No description available for libmodplug0c2 in ubuntu edgy.