Bug#527075: gst-plugins-bad0.10: CVE-2009-1438 integer overflow in embedded libmodplug
nion at debian.org
Tue May 5 14:05:16 UTC 2009
Tags: security patch
the following CVE (Common Vulnerabilities & Exposures) id was
published for gst-plugins-bad0.10.
| Integer overflow in the CSoundFile::ReadMed function
| (src/load_med.cpp) in libmodplug before 0.8.6, as used in
| gstreamer-plugins and other products, allows context-dependent
| attackers to execute arbitrary code via a MED file with a crafted (1)
| song comment or (2) song name, which triggers a heap-based buffer
Since you embedd this package in your sources....
The upstream patch is available on:
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
For further information see:
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 197 bytes
Desc: not available
More information about the Pkg-gstreamer-maintainers