Processed (with 4 errors): Re: gst-plugins-bad0.10: CVE-2009-1438 integer overflow in embedded libmodplug

Debian Bug Tracking System owner at bugs.debian.org
Wed May 6 07:39:09 UTC 2009


Processing commands for control at bugs.debian.org:

> notfound 527077 0.10.10.2-1
Bug#527077: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
Bug no longer marked as found in version 0.10.10.2-1.

> notfound 527077 0.10.10.3-1
Bug#527077: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
Bug no longer marked as found in version 0.10.10.3-1.

> notfound 527077 0.10.11-1
Bug#527077: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
Bug no longer marked as found in version 0.10.11-1.

> notfound 527077 0.10.11-2
Bug#527077: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
Bug no longer marked as found in version 0.10.11-2.

> notfound 527077 0.10.11-2+b1
Bug#527077: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
Bug no longer marked as found in version 0.10.11-2+b1.

> Hi,
Unknown command or malformed arguments to command.

> thanks for reporting, this bug doesn't affect the version in
Unknown command or malformed arguments to command.

> unstable/testing though as it builds against an external libmodplug.
Unknown command or malformed arguments to command.

> I'll upload fixed versions for stable and oldstable later today.
Unknown command or malformed arguments to command.

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)



More information about the Pkg-gstreamer-maintainers mailing list