Hi,

 I noticed you reported this CVE against libmodplug:

On Thu, Aug 17, 2006, Alec Berryman wrote:
> CVE-2006-4192: "Multiple buffer overflows in MODPlug Tracker (OpenMPT)
> 1.17.02.43 and earlier and libmodplug 0.8 and earlier allow
> user-assisted remote attackers to execute arbitrary code via (1) long
> strings in ITP files used by the CSoundFile::ReadITProject function in
> soundlib/Load_it.cpp and (2) crafted modules used by the
> CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated
> by crafted AMF files."

 But gst-plugins-bad0.10 is affected as well.  (I've filed a bug against
 gst-plugins-bad0.10, but it didn't arrive yet.)

 Could you please add gst-plugins-bad0.10 to the embedded-code-copies
 file for libmodplug?

 (Please Cc: me, I'm not on the list.)

   Thanks,
-- 
Loïc Minier <[EMAIL PROTECTED]>

_______________________________________________
Secure-testing-team mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/secure-testing-team

Reply via email to