Processed (with 4 errors): Re: gst-plugins-bad0.10: CVE-2009-1438 integer overflow in embedded libmodplug
Debian Bug Tracking System
owner at bugs.debian.org
Wed May 6 07:39:09 UTC 2009
Processing commands for control at bugs.debian.org:
> notfound 527077 0.10.10.2-1
Bug#527077: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
Bug no longer marked as found in version 0.10.10.2-1.
> notfound 527077 0.10.10.3-1
Bug#527077: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
Bug no longer marked as found in version 0.10.10.3-1.
> notfound 527077 0.10.11-1
Bug#527077: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
Bug no longer marked as found in version 0.10.11-1.
> notfound 527077 0.10.11-2
Bug#527077: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
Bug no longer marked as found in version 0.10.11-2.
> notfound 527077 0.10.11-2+b1
Bug#527077: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
Bug no longer marked as found in version 0.10.11-2+b1.
> Hi,
Unknown command or malformed arguments to command.
> thanks for reporting, this bug doesn't affect the version in
Unknown command or malformed arguments to command.
> unstable/testing though as it builds against an external libmodplug.
Unknown command or malformed arguments to command.
> I'll upload fixed versions for stable and oldstable later today.
Unknown command or malformed arguments to command.
>
End of message, stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
(administrator, Debian Bugs database)
More information about the Pkg-gstreamer-maintainers
mailing list