|
|
Message-Id: <1241002707.3186.6.camel@dhcp-lab-164.englab.brq.redhat.com>
Date: Wed, 29 Apr 2009 12:58:27 +0200
From: Jan Lieskovsky <jlieskov@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>,
Konstanty <konstanty@...il.com>
Subject: Re: CVE Request -- libmodplug
Hello Steve,
apologize for not sending these all at once, but noticed
the following one only today. There is another buffer
overflow (DoS) vulnerability in libmodplug -- this time
in PAT sample loader.
Referecences:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084
http://sourceforge.net/tracker/?func=detail&aid=2777467&group_id=1275&atid=301275
http://secunia.com/advisories/34927
http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3&r2=1.4 (patch)
Thanks, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team
> On Tue, 2009-04-21 at 14:47 +0200, Jan Lieskovsky wrote:
> > Hello Steve,
> >
> > could you please allocate a new CVE-2008-XXXX identifier for
> > the following old libmodplug issue:
> >
> > References:
> > http://bugs.gentoo.org/show_bug.cgi?id=266913
> > http://www.securityfocus.com/bid/30801/info
> > http://sourceforge.net/project/shownotes.php?release_id=677065&group_id=1275
> > https://bugzilla.redhat.com/show_bug.cgi?id=496834
> >
> > Affected libmodplug versions: x < 0.8.6
> >
> > Patch (against modplug-xmms/libmodplug):
> > http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1&r2=1.2
> >
> > Thanks, Jan.
> > --
> > Jan iankko Lieskovsky / Red Hat Security Response Team
> >
> >
> >
>
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.