Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 11 Apr 2011 11:14:30 -0600
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request for libmodplug

A stack-based buffer overflow vulnerability was found in libmodplug when
handling S3M media files.  Could we get a CVE name for this?

References:

https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt
http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commitdiff;h=aecef259828a89bb00c2e6f78e89de7363b2237b
https://bugzilla.redhat.com/show_bug.cgi?id=695420
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091

Thanks.

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.