Branches for Intrepid

Name Status Last Modified Last Commit
lp://staging/ubuntu/intrepid/mpg123 2 Mature 2009-08-19 02:18:36 UTC
11. * src/libmpg123/id3.c: Apply upstream...

Author: Daniel Kobras
Revision Date: 2008-07-06 18:46:38 UTC

* src/libmpg123/id3.c: Apply upstream fix for out-of-bounds error in
  id3 parser.
* debian/mpg123.postinst: Output auto-detection is no good as long as
  output-specific wrappers are still listed as alternatives with higher
  priority. Remove alternative setting for all wrapper scripts, therefore.
  Closes: #391669
* debian/mpg123-wrapper.in: Call mpg123 binary with exec to avoid stray
  shell process as suggested by Shane Wegner.

lp://staging/ubuntu/intrepid-security/mpg123 2 Mature 2009-08-19 02:18:53 UTC
12. * SECURITY UPDATE: Integer signedness...

Author: Stefan Lesicnik
Revision Date: 2009-05-01 09:24:44 UTC

* SECURITY UPDATE: Integer signedness error in the store_id3_text function
  in the ID3v2 code in mpg123 before 1.7.2 allows remote attackers to cause
  a denial of service (out-of-bounds memory access) and possibly execute
  arbitrary code via an ID3 tag with a negative encoding value. (LP: 370031).
 - src/libmpg123/id3.c: Inline patch from upstream SVN rev 1920.
 - http://www.mpg123.org/cgi-bin/viewvc.cgi/tags/1.7.2/?view=log
 - CVE-2009-1301

lp://staging/ubuntu/intrepid-updates/mpg123 2 Mature 2009-08-19 02:19:11 UTC
12. * SECURITY UPDATE: Integer signedness...

Author: Stefan Lesicnik
Revision Date: 2009-05-01 09:24:44 UTC

* SECURITY UPDATE: Integer signedness error in the store_id3_text function
  in the ID3v2 code in mpg123 before 1.7.2 allows remote attackers to cause
  a denial of service (out-of-bounds memory access) and possibly execute
  arbitrary code via an ID3 tag with a negative encoding value. (LP: 370031).
 - src/libmpg123/id3.c: Inline patch from upstream SVN rev 1920.
 - http://www.mpg123.org/cgi-bin/viewvc.cgi/tags/1.7.2/?view=log
 - CVE-2009-1301

13 of 3 results