Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVSA-2009:272 ] libmikmod

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1255380331-13155-2668

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Security Advisory MDVSA-2009:272

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : libmikmod

Date : October 12, 2009

Affected: 2008.1, 2009.0, Enterprise Server 5.0

_______________________________________________________________________

 

Problem Description:

 

Multiple vulnerabilities has been found and corrected in libmikmod:

 

libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and

possibly other products, relies on the channel count of the last

loaded song, rather than the currently playing song, for certain

playback calculations, which allows user-assisted attackers to cause

a denial of service (application crash) by loading multiple songs

(aka MOD files) with different numbers of channels (CVE-2007-6720).

 

libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other

products, allows user-assisted attackers to cause a denial of service

(application crash) by loading an XM file (CVE-2009-0179).

 

This update fixes these vulnerabilities.

_______________________________________________________________________

 

References:

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6720

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0179

_______________________________________________________________________

 

Updated Packages:

 

Mandriva Linux 2008.1:

ee13f78e0745fc4c3c0114ecbf9f4699 2008.1/i586/libmikmod2-3.1.11a-10.1mdv2008.1.i586.rpm

aba86fb918942cd6b0b1fb56132d280d 2008.1/i586/libmikmod-devel-3.1.11a-10.1mdv2008.1.i586.rpm

99e59be60034ec2dc460d02466520cb2 2008.1/SRPMS/libmikmod-3.1.11a-10.1mdv2008.1.src.rpm

 

Mandriva Linux 2008.1/X86_64:

f8705d80b93a24f70fbbac068a9a14db 2008.1/x86_64/lib64mikmod2-3.1.11a-10.1mdv2008.1.x86_64.rpm

b27378922ebd3d0877df90307bc6f70d 2008.1/x86_64/lib64mikmod-devel-3.1.11a-10.1mdv2008.1.x86_64.rpm

99e59be60034ec2dc460d02466520cb2 2008.1/SRPMS/libmikmod-3.1.11a-10.1mdv2008.1.src.rpm

 

Mandriva Linux 2009.0:

4d222768adda8adeeec869135c69db61 2009.0/i586/libmikmod3-3.2.0-0.beta2.2.1mdv2009.0.i586.rpm

0792993b84ec5165267f08215b94b249 2009.0/i586/libmikmod-devel-3.2.0-0.beta2.2.1mdv2009.0.i586.rpm

b169668d67ed8f1ab2054390c2042e0d 2009.0/SRPMS/libmikmod-3.2.0-0.beta2.2.1mdv2009.0.src.rpm

 

Mandriva Linux 2009.0/X86_64:

13348ccba98cdb6d03e968ef7c8d9d31 2009.0/x86_64/lib64mikmod3-3.2.0-0.beta2.2.1mdv2009.0.x86_64.rpm

e90672c09034110b6115e250664ab09b 2009.0/x86_64/lib64mikmod-devel-3.2.0-0.beta2.2.1mdv2009.0.x86_64.rpm

b169668d67ed8f1ab2054390c2042e0d 2009.0/SRPMS/libmikmod-3.2.0-0.beta2.2.1mdv2009.0.src.rpm

 

Mandriva Enterprise Server 5:

56561664eb1c0a22d14f6e2115bcfb06 mes5/i586/libmikmod3-3.2.0-0.beta2.2.1mdvmes5.i586.rpm

3eafb10d9b0231549efc8b35d77bb95e mes5/i586/libmikmod-devel-3.2.0-0.beta2.2.1mdvmes5.i586.rpm

94450e433b21a78259f80b4ad356903c mes5/SRPMS/libmikmod-3.2.0-0.beta2.2.1mdvmes5.src.rpm

 

Mandriva Enterprise Server 5/X86_64:

870f77ca7417e18cbaecc15060e24532 mes5/x86_64/lib64mikmod3-3.2.0-0.beta2.2.1mdvmes5.x86_64.rpm

999b6603d2267b3dbd7bb1cf5f0ad113 mes5/x86_64/lib64mikmod-devel-3.2.0-0.beta2.2.1mdvmes5.x86_64.rpm

94450e433b21a78259f80b4ad356903c mes5/SRPMS/libmikmod-3.2.0-0.beta2.2.1mdvmes5.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFK02dpmqjQ0CJFipgRAvltAKCQCTp82m2A5I4AFL8OyhhD9wep/gCgk0iS

7c/1cHxm8jY7luKdEH7QpiU=

=Odi6

-----END PGP SIGNATURE-----

 

 

------------=_1255380331-13155-2668

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1255380331-13155-2668--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×