Package: gst-plugins-bad0.10
Version: 0.10.3-3
Severity: serious
Tags: security patch

        Hi,

 gst-plugins-bad0.10 is affected by CVE-2006-4192: buffer overflow in
 gst/modplug/libmodplug/sndfile.cpp.  See GNOME #385788.

 Please let me know if I may upload the proposed NMU patch (attached).

   Bye,

-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-686
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)

-- 
Loïc Minier <[EMAIL PROTECTED]>
--- gst-plugins-bad0.10-0.10.3/debian/changelog
+++ gst-plugins-bad0.10-0.10.3/debian/changelog
@@ -1,3 +1,12 @@
+gst-plugins-bad0.10 (0.10.3-3.1) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * SECURITY: buffer overflow.
+  * Fix potential buffer overflow in gst/modplug/libmodplug/sndfile.cpp;
+    CVE-2006-4192; GNOME #385788; from upstream CVS / next upstream release.
+
+ -- Loic Minier <[EMAIL PROTECTED]>  Mon, 22 Jan 2007 16:05:35 +0100
+
 gst-plugins-bad0.10 (0.10.3-3) unstable; urgency=low
 
   * debian/rules:
--- gst-plugins-bad0.10-0.10.3.orig/gst/modplug/libmodplug/sndfile.cpp
+++ gst-plugins-bad0.10-0.10.3/gst/modplug/libmodplug/sndfile.cpp
@@ -1081,7 +1081,7 @@
 {
 	UINT len = 0, mem = pIns->nLength+6;
 
-	if ((!pIns) || (pIns->nLength < 4) || (!lpMemFile)) return 0;
+	if ((!pIns) || ((int)pIns->nLength < 4) || (!lpMemFile)) return 0;
 	if (pIns->nLength > MAX_SAMPLE_LENGTH) pIns->nLength = MAX_SAMPLE_LENGTH;
 	pIns->uFlags &= ~(CHN_16BIT|CHN_STEREO);
 	if (nFlags & RSF_16BIT)

Reply via email to