Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 11 Apr 2011 11:14:30 -0600
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request for libmodplug

A stack-based buffer overflow vulnerability was found in libmodplug when
handling S3M media files.  Could we get a CVE name for this?

References:

https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt
http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commitdiff;h=aecef259828a89bb00c2e6f78e89de7363b2237b
https://bugzilla.redhat.com/show_bug.cgi?id=695420
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091

Thanks.

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ