Bug#1074416: libde265: CVE-2024-38949 CVE-2024-38950

2024-06-28 Thread Moritz Mühlenhoff
Source: libde265 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for libde265. CVE-2024-38949[0]: | Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows | attackers to crash the application via crafted payload to

Re: Debdiffs for CVE-2024-5197/libvpx

2024-06-26 Thread Moritz Mühlenhoff
Am Thu, Jun 20, 2024 at 01:46:41PM +0300 schrieb Adrian Bunk: > Hi, > > attached are debdiffs for CVE-2024-5197/libvpx if this should be a DSA. DSA has been released, thanks! Cheers, Moritz

Re: Debdiffs for CVE-2024-5197/libvpx

2024-06-25 Thread Moritz Mühlenhoff
Am Thu, Jun 20, 2024 at 01:46:41PM +0300 schrieb Adrian Bunk: > Hi, > > attached are debdiffs for CVE-2024-5197/libvpx if this should be a DSA. > > Alternatively, I could also make pu requests instead. Thanks, these look good. We can release these via -security, please upload to security-master.

Bug#1032972: handbrake: debian version of handbrake does not handle subtitles correctly

2024-01-29 Thread Moritz Mühlenhoff
Hi Michael, thanks for looking into this! michael spreng wrote: > The above mentioned patch to ffmpeg changes ffmpeg to remember the pts. But > handbrake can remember the pts just as well. So see the attached patch which > does exactly that: if the subtitle is incomplete, it saves the pts to the >

Bug#1059275: libde265: CVE-2023-49465 CVE-2023-49467 CVE-2023-49468

2023-12-22 Thread Moritz Mühlenhoff
Source: libde265 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for libde265. CVE-2023-49465[0]: | Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow | vulnerability in the derive_spatial_luma_vector_predi

Bug#1059151: libheif: CVE-2023-49460 CVE-2023-49462 CVE-2023-49463 CVE-2023-49464

2023-12-20 Thread Moritz Mühlenhoff
Source: libheif X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for libheif. CVE-2023-49460[0]: | libheif v1.17.5 was discovered to contain a segmentation violation | via the function UncompressedImageCodec::decode_uncomp

Bug#1051890: libsndfile: CVE-2022-33064

2023-09-13 Thread Moritz Mühlenhoff
Source: libsndfile X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for libsndfile. CVE-2022-33064[0]: | An off-by-one error in function wav_read_header in src/wav.c in | Libsndfile 1.1.0, results in a write out of bound, whi

Bug#1051891: libsndfile: CVE-2022-33065

2023-09-13 Thread Moritz Mühlenhoff
Source: libsndfile X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for libsndfile. CVE-2022-33065[0]: | Multiple signed integers overflow in function au_read_header in | src/au.c and in functions mat4_open and mat4_read_head

Bug#1051740: gpac: CVE-2023-3012 CVE-2023-3013 CVE-2023-3291 CVE-2023-39562 CVE-2023-4678 CVE-2023-4681 CVE-2023-4682 CVE-2023-4683 CVE-2023-4720 CVE-2023-4721 CVE-2023-4722 CVE-2023-4754 CVE-2023-475

2023-09-11 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for gpac. CVE-2023-3012[0]: | NULL Pointer Dereference in GitHub repository gpac/gpac prior to | 2.2.2. https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb0207

Bug#1050836: oggvideotools: CVE-2020-21722 CVE-2020-21723 CVE-2020-21724

2023-08-29 Thread Moritz Mühlenhoff
Source: oggvideotools X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for oggvideotools. CVE-2020-21722[0]: | Buffer Overflow vulnerability in oggvideotools 0.9.1 allows remote | attackers to run arbitrary code via openin

Bug#1041113: sox: CVE-2023-26590

2023-07-14 Thread Moritz Mühlenhoff
Source: sox X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for sox. CVE-2023-26590[0]: | A floating point exception vulnerability was found in sox, in the | lsx_aiffstartwrite function at sox/src/aiff.c:622:58. This flaw ca

Bug#1041112: sox: CVE-2023-32627

2023-07-14 Thread Moritz Mühlenhoff
Source: sox X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for sox. CVE-2023-32627[0]: | A floating point exception vulnerability was found in sox, in the | read_samples function at sox/src/voc.c:334:18. This flaw can lead

Bug#1041111: sox: CVE-2023-34318

2023-07-14 Thread Moritz Mühlenhoff
Source: sox X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for sox. CVE-2023-34318[0]: | A heap buffer overflow vulnerability was found in sox, in the | startread function at sox/src/hcom.c:160:41. This flaw can lead to a |

Bug#1041110: sox: CVE-2023-34432

2023-07-14 Thread Moritz Mühlenhoff
Source: sox X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for sox. CVE-2023-34432[0]: | A heap buffer overflow vulnerability was found in sox, in the | lsx_readbuf function at sox/src/formats_i.c:98:16. This flaw can | lead to

Bug#1040593: kodi: CVE-2023-30207

2023-07-07 Thread Moritz Mühlenhoff
Source: kodi X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerability was published for kodi. CVE-2023-30207[0]: | A divide by zero issue discovered in Kodi Home Theater Software 19.5 | and earlier allows attackers to cause a denial of service via us

Bug#1034732: fixed in gpac 2.2.1+dfsg1-1

2023-06-20 Thread Moritz Mühlenhoff
Am Tue, Jun 20, 2023 at 06:06:26PM + schrieb Debian FTP Masters: > Source: gpac > Source-Version: 2.2.1+dfsg1-1 > Done: Reinhard Tartler > Changes: > gpac (2.2.1+dfsg1-1) experimental; urgency=medium > . >* New upstream version, > closes: #1033116, #1034732, #1034187, #1036701, #103

Bug#1036701: gpac: CVE-2023-2837 CVE-2023-2838 CVE-2023-2839 CVE-2023-2840

2023-05-24 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for gpac. CVE-2023-2837[0]: | Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to | 2.2.2. https://huntr.dev/bounties/a6bfd1b2-aba8-4c6f-90c4-e

Bug#1035950: dav1d: CVE-2023-32570

2023-05-11 Thread Moritz Mühlenhoff
Source: dav1d X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for dav1d. CVE-2023-32570[0]: | VideoLAN dav1d before 1.2.0 has a thread_task.c race condition that | can lead to an application crash, related to dav1d_decode_fr

Bug#1034890: gpac: CVE-2023-0841

2023-04-26 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerability was published for gpac. CVE-2023-0841[0]: | A vulnerability, which was classified as critical, has been found in | GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function |

Bug#1034187: gpac: CVE-2023-0841 CVE-2023-1448 CVE-2023-1449 CVE-2023-1452 CVE-2023-1654 CVE-2023-1655

2023-04-10 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for gpac. CVE-2023-1448[1]: | A vulnerability, which was classified as problematic, was found in | GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the functi

Bug#1033257: libde265: CVE-2023-27102 CVE-2023-27103

2023-03-20 Thread Moritz Mühlenhoff
Source: libde265 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for libde265. CVE-2023-27102[0]: | Libde265 v1.0.11 was discovered to contain a segmentation violation | via the function decoder_context::process_slice_seg

Bug#1033116: gpac: CVE-2022-3222 CVE-2023-0866 CVE-2022-4202 CVE-2022-43039 CVE-2023-23143 CVE-2023-23144 CVE-2023-23145 CVE-2022-43040 CVE-2022-43042 CVE-2022-43043 CVE-2022-43044 CVE-2022-43045 CVE-

2023-03-17 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for gpac. CVE-2022-3222[0]: | Uncontrolled Recursion in GitHub repository gpac/gpac prior to | 2.1.0-DEV. https://huntr.dev/bounties/b29c69fa-3eac-41e4-9d4f-d861ab

Bug#1032101: libheif: CVE-2023-0996

2023-02-27 Thread Moritz Mühlenhoff
Source: libheif X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for libheif. CVE-2023-0996[0]: | There is a vulnerability in the strided image data parsing code in the | emscripten wrapper for libheif. An attacker could exploit

Bug#1030049: opusfile: CVE-2022-47021

2023-01-30 Thread Moritz Mühlenhoff
Source: opusfile X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for opusfile. CVE-2022-47021[0]: | A null pointer dereference issue was discovered in functions | op_get_data and op_open1 in opusfile.c in xiph opusfile 0.9 t

Bug#1027179: libde265: CVE-2022-43235 CVE-2022-43236 CVE-2022-43237 CVE-2022-43238 CVE-2022-43239 CVE-2022-43240 CVE-2022-43241 CVE-2022-43242 CVE-2022-43244 CVE-2022-43245 CVE-2022-43249 CVE-2022-432

2022-12-28 Thread Moritz Mühlenhoff
Source: libde265 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for libde265. CVE-2022-43235[0]: | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow | vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse i

Bug#1025816: libde265: CVE-2022-43243 CVE-2022-43248 CVE-2022-43253

2022-12-09 Thread Moritz Mühlenhoff
Source: libde265 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for libde265. CVE-2022-43243[0]: | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow | vulnerability via ff_hevc_put_weighted_pred_avg_8_sse in s

Bug#1021136: sox: CVE-2022-39236 CVE-2022-39249 CVE-2022-39251

2022-10-02 Thread Moritz Mühlenhoff
Source: sox X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for sox. CVE-2022-39236[0]: | Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. | Starting with version 17.1.0-rc.1, improperly formed beacon eve

Bug#1021135: sox: CVE-2021-33844

2022-10-02 Thread Moritz Mühlenhoff
Source: sox X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerability was published for sox. CVE-2021-33844[0]: | A floating point exception (divide-by-zero) issue was discovered in | SoX in functon startread() of wav.c file. An attacker with a crafte

Bug#1021134: sox: CVE-2021-23172

2022-10-02 Thread Moritz Mühlenhoff
Source: sox X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for sox. CVE-2021-23172[0]: | A vulnerability was found in SoX, where a heap-buffer-overflow occurs | in function startread() in hcom.c file. The vulnerability is |

Bug#1021133: sox: CVE-2021-23159

2022-10-02 Thread Moritz Mühlenhoff
Source: sox X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for sox. CVE-2021-23159[0]: | A vulnerability was found in SoX, where a heap-buffer-overflow occurs | in function lsx_read_w_buf() in formats_i.c file. The vulnerab

Bug#1021013: mplayer: CVE-2022-38600 CVE-2022-38856 CVE-2022-38861 CVE-2022-38862 CVE-2022-38864

2022-09-30 Thread Moritz Mühlenhoff
Source: mplayer X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for mplayer. CVE-2022-38600[0]: | Mplayer SVN-r38374-13.0.1 is vulnerable to Memory Leak via vf.c and | vf_vo.c. https://trac.mplayerhq.hu/ticket/2390#comment:2

Bug#1019595: gpac: CVE-2022-38530 CVE-2022-36186 CVE-2022-36190 CVE-2022-36191

2022-09-12 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for gpac. CVE-2022-38530[0]: | GPAC v2.1-DEV-rev232-gfcaa01ebb-master was discovered to contain a | stack overflow when processing ISOM_IOD. https://github.com

Bug#1016986: Should pd-py be removed?

2022-09-09 Thread Moritz Mühlenhoff
severity 1016986 normal reassign 1016986 ftp.debian.org retitle 1016986 RM: pd-py -- RoM; depends on Python 2 thanks > Your package came up as a candidate for removal from Debian: > - Still depends on Python 2, which is finally being removed in Bookworm > - Last upload in 2018 > > If you disagree

Bug#1016443: gpac: CVE-2022-29339 CVE-2022-29340 CVE-2022-29537 CVE-2022-30976 CVE-2022-1035 CVE-2022-1172 CVE-2022-1222 CVE-2022-1441 CVE-2022-1795

2022-07-31 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for gpac. CVE-2022-29339[0]: | In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in | utils/bitstream.c has a failed assertion, which causes a Denial of

Bug#1016142: gpac: CVE-2022-2549

2022-07-27 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for gpac. CVE-2022-2549[0]: | NULL Pointer Dereference in GitHub repository gpac/gpac prior to | v2.1.0-DEV. https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d

Bug#1015790: wavpack: CVE-2022-2476

2022-07-21 Thread Moritz Mühlenhoff
Source: wavpack X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for wavpack. CVE-2022-2476[0]: | A null pointer dereference bug was found in wavpack-5.4.0 The results | from the ASAN log: AddressSanitizer:DEADLYSIGNAL ==

Bug#1015788: gpac: CVE-2022-2453 CVE-2022-2454

2022-07-21 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for gpac. CVE-2022-2453[0]: | Use After Free in GitHub repository gpac/gpac prior to 2.1-DEV. https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a h

Bug#1014999: libde265: CVE-2020-21594 CVE-2020-21595 CVE-2020-21596 CVE-2020-21597 CVE-2020-21599 CVE-2020-21601 CVE-2020-21603 CVE-2020-21604 CVE-2020-21605 CVE-2020-21606

2022-07-15 Thread Moritz Mühlenhoff
Source: libde265 X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for libde265. CVE-2020-21594[0]: | libde265 v1.0.4 contains a heap buffer overflow in the | put_epel_hv_fallback function, which can be exploited via a craf

Bug#1014977: libde265: CVE-2022-1253 CVE-2021-36411 CVE-2021-36410 CVE-2021-36408 CVE-2021-35452

2022-07-15 Thread Moritz Mühlenhoff
Source: libde265 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for libde265. CVE-2022-1253[0]: | Heap-based Buffer Overflow in GitHub repository strukturag/libde265 | prior to and including 1.0.8. The fix is established in

Bug#1014783: faust: CVE-2021-41736 CVE-2021-41737

2022-07-11 Thread Moritz Mühlenhoff
Source: faust X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerabilities were published for faust. CVE-2021-41736[0]: | Faust v2.35.0 was discovered to contain a heap-buffer overflow in the | function realPropagate() at propagate.cpp. https://github

Bug#1014777: libgig: CVE-2021-32294

2022-07-11 Thread Moritz Mühlenhoff
Source: libgig X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for libgig. CVE-2021-32294[0]: | An issue was discovered in libgig through 20200507. A heap-buffer- | overflow exists in the function RIFF::List::GetSubList loca

Bug#1014713: libsndfile: CVE-2021-4156

2022-07-10 Thread Moritz Mühlenhoff
Source: libsndfile X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for libsndfile. CVE-2021-4156[0]: | An out-of-bounds read flaw was found in libsndfile's FLAC codec | functionality. An attacker who is able to submit a spec

Bug#1014125: libheif: CVE-2020-23109

2022-06-30 Thread Moritz Mühlenhoff
Source: libheif X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for libheif. CVE-2020-23109[0]: | Buffer overflow vulnerability in function convert_colorspace in | heif_colorconversion.cc in libheif v1.6.2, allows attackers

Bug#1012516: sox: CVE-2022-31650 CVE-2022-31651

2022-06-08 Thread Moritz Mühlenhoff
Source: sox X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerabilities were published for sox. CVE-2022-31650[0]: | In SoX 14.4.2, there is a floating-point exception in | lsx_aiffstartwrite in aiff.c in libsox.a. CVE-2022-31651[1]: | In SoX 14.4.2,

Bug#991496: libsndfile: CVE-2021-3246

2021-07-25 Thread Moritz Mühlenhoff
Source: libsndfile X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerability was published for libsndfile. CVE-2021-3246[0]: | A heap buffer overflow vulnerability in msadpcm_decode_block of | libsndfile 1.0.30 allows attackers to execute arbitrary cod

Bug#936883: libkate: Python2 removal in sid/bullseye

2019-10-28 Thread Moritz Mühlenhoff
On Tue, Sep 03, 2019 at 06:50:02AM -0400, Scott Kitterman wrote: > On Fri, 30 Aug 2019 07:23:42 + Matthias Klose wrote: > > Package: src:libkate > > Version: 0.4.1-9 > > Severity: normal > > Tags: sid bullseye > > User: debian-pyt...@lists.debian.org > > Usertags: py2removal > > > > Python2 b

Bug#875038: [lmms] Future Qt4 removal from Buster

2019-08-25 Thread Moritz Mühlenhoff
On Sun, Oct 14, 2018 at 03:16:27AM +0200, Javier Serrano Polo wrote: > On Fri, 23 Mar 2018 18:23:51 +0800 Boyuan Yang <073p...@gmail.com> > wrote: > > lmms 1.2.0 is on its way. > > I will not package a candidate version unless this bug becomes serious. > Efforts should be directed in helping upstr

Bug#917292: ffmpeg: linking with libcrystalhd3 seem of no use at all

2019-08-08 Thread Moritz Mühlenhoff
On Sat, Jul 27, 2019 at 03:27:34PM -0300, Jonas Smedegaard wrote: > Quoting James Cowgill (2019-07-27 12:48:23) > > Hi, > > > > On 27/07/2019 15:52, Jonas Smedegaard wrote: > > > Quoting James Cowgill (2019-07-27 11:12:00) > > >> Hi, > > >> > > >>> ffmpeg currently links with libcrystalhd3. > > >>

Bug#926666: CVE-2019-9718 CVE-2019-9721

2019-04-20 Thread Moritz Mühlenhoff
On Mon, Apr 08, 2019 at 08:31:43PM +0200, Moritz Muehlenhoff wrote: > Package: ffmpeg > Version: 7:4.1.1-1 > Severity: important > Tags: security > > https://security-tracker.debian.org/tracker/CVE-2019-9718 > https://security-tracker.debian.org/tracker/CVE-2019-9721 > > Both a fixed in the 4.1.3

Re: gpac_0.7.1+dfsg1-1_amd64.changes is NEW

2019-04-04 Thread Moritz Mühlenhoff
On Tue, Apr 02, 2019 at 10:40:44PM -0400, Reinhard Tartler wrote: > Ah, that's great news. I didn't realize that Moritz backported the > security fixes to an earlier upstream version. I managed to locate the > git commits but wasn't comfortable with backporting them to version 0.5.2, > not all of t

Re: gpac: CVE-2018-20760 CVE-2018-20761 CVE-2018-20762 CVE-2018-20763

2019-04-01 Thread Moritz Mühlenhoff
On Tue, Mar 12, 2019 at 10:45:31PM +0100, jmm wrote: > On Sun, Feb 10, 2019 at 07:48:12PM +0100, Moritz Muehlenhoff wrote: > > Source: gpac > > Severity: grave > > Tags: security > > There's a 0.7.1 in NEW, but that won't be in time for buster, could you > please upload a targeted fix for the open

gpac: CVE-2018-20760 CVE-2018-20761 CVE-2018-20762 CVE-2018-20763

2019-03-12 Thread Moritz Mühlenhoff
On Sun, Feb 10, 2019 at 07:48:12PM +0100, Moritz Muehlenhoff wrote: > Source: gpac > Severity: grave > Tags: security There's a 0.7.1 in NEW, but that won't be in time for buster, could you please upload a targeted fix for the open issues for 0.5? https://security-tracker.debian.org/tracker/sourc

Bug#919529: CVE-2019-6256

2019-01-17 Thread Moritz Mühlenhoff
On Thu, Jan 17, 2019 at 12:00:13AM +0100, Sebastian Ramacher wrote: > Control: found -1 2016.11.28-1 > > On 2019-01-16 23:19:45, Moritz Muehlenhoff wrote: > > Source: liblivemedia > > Severity: grave > > Tags: security > > > > Please see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6256

Bug#911584: libopenmpt: out of bounds memory read in MED files

2018-10-26 Thread Moritz Mühlenhoff
On Mon, Oct 22, 2018 at 09:44:27AM +0100, James Cowgill wrote: > Source: libopenmpt > Version: 0.2.7025~beta20.1-1 > Severity: important > Tags: security upstream fixed-upstream > > Hi, > > Upstream 0.3.13 released a fix for an out of bound read in malformed MED > files. It affects stretch. Does