Change logs for libmodplug source package in Dapper

  • libmodplug (1:0.7-5ubuntu0.6.06.2) dapper-security; urgency=low
    
      * SECURITY UPDATE: code execution via integer overflow in
        CSoundFile::ReadMed
        - src/load_med.cpp: check for overflow in song comment and song name.
          Make sure strings are properly NULL-terminated.
        - http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1&r2=1.2
        - http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.2&r2=1.3
        - CVE-2009-1438
    
     -- Marc Deslauriers <email address hidden>   Wed, 06 May 2009 15:45:23 -0400
  • libmodplug (1:0.7-5ubuntu0.6.06.1) dapper-security; urgency=low
    
      * SECURITY UPDATE: possible arbitrary code execution as the user via buffer
        overflows when processing crafted files with very large sample sizes
      * patch for sndfile.cpp to properly verify nLength
      * References
        CVE-2006-4192
    
     -- Jamie Strandboge <email address hidden>   Thu, 27 Sep 2007 14:34:04 -0400
  • libmodplug (1:0.7-5) unstable; urgency=low
    
    
      * Official build, acknowledging NMU, and closing out the bugs
        (closes: #318392, #318994)
      * Standards-Version: 3.6.2.0 (no changes required)
    
     -- Zed Pobre <email address hidden>  Fri, 19 Aug 2005 18:13:54 -0500