Author: nion Date: 2009-05-05 14:21:02 +0000 (Tue, 05 May 2009) New Revision: 11792 Modified: data/CVE/list Log: another libmodplug buffer overflow Modified: data/CVE/list ==================================================================--- data/CVE/list 2009-05-05 14:11:37 UTC (rev 11791) +++ data/CVE/list 2009-05-05 14:21:02 UTC (rev 11792) @@ -1,3 +1,6 @@ +CVE-2009-XXXX [libmodplug buffer overflow in PAT sampler] + - libmodplug <unfixed> (medium; bug #526084) + - gst-plugins-bad0.10 <unfixed> (medium; bug #527077) CVE-2009-1515 [file 5.xx buffer overflow in the cdf_read_sat function] - file 5.02-1 [lenny] - file <not-affected> (Vulnerable code not present)
Giuseppe Iuculano
2009-May-06 08:48 UTC
[Secure-testing-team] [Secure-testing-commits] r11792 - data/CVE
Hi, Nico Golde ha scritto:> +CVE-2009-XXXX [libmodplug buffer overflow in PAT sampler] > + - libmodplug <unfixed> (medium; bug #526084)etch is not affected (vulnerable code not present) Cheers, Giuseppe. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 197 bytes Desc: OpenPGP digital signature URL: <http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20090506/aec29c05/attachment.pgp>