Package: gst-plugins-bad0.10
Version: 0.10.3-3
Severity: serious
Tags: security patch
Hi,
gst-plugins-bad0.10 is affected by CVE-2006-4192: buffer overflow in
gst/modplug/libmodplug/sndfile.cpp. See GNOME #385788.
Please let me know if I may upload the proposed NMU patch (attached).
Bye,
-- System Information:
Debian Release: 4.0
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-686
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
--
Loïc Minier <[EMAIL PROTECTED]>
--- gst-plugins-bad0.10-0.10.3/debian/changelog
+++ gst-plugins-bad0.10-0.10.3/debian/changelog
@@ -1,3 +1,12 @@
+gst-plugins-bad0.10 (0.10.3-3.1) unstable; urgency=high
+
+ * Non-maintainer upload.
+ * SECURITY: buffer overflow.
+ * Fix potential buffer overflow in gst/modplug/libmodplug/sndfile.cpp;
+ CVE-2006-4192; GNOME #385788; from upstream CVS / next upstream release.
+
+ -- Loic Minier <[EMAIL PROTECTED]> Mon, 22 Jan 2007 16:05:35 +0100
+
gst-plugins-bad0.10 (0.10.3-3) unstable; urgency=low
* debian/rules:
--- gst-plugins-bad0.10-0.10.3.orig/gst/modplug/libmodplug/sndfile.cpp
+++ gst-plugins-bad0.10-0.10.3/gst/modplug/libmodplug/sndfile.cpp
@@ -1081,7 +1081,7 @@
{
UINT len = 0, mem = pIns->nLength+6;
- if ((!pIns) || (pIns->nLength < 4) || (!lpMemFile)) return 0;
+ if ((!pIns) || ((int)pIns->nLength < 4) || (!lpMemFile)) return 0;
if (pIns->nLength > MAX_SAMPLE_LENGTH) pIns->nLength = MAX_SAMPLE_LENGTH;
pIns->uFlags &= ~(CHN_16BIT|CHN_STEREO);
if (nFlags & RSF_16BIT)