libmodplug: Fixed multiple vulnerabilities reported in <= 0.8.8.3

This update of libmodplug0 fixes the following issues:

1) An integer overflow error exists within the
"CSoundFile::ReadWav()" function (src/load_wav.cpp) when
processing certain WAV files. This can be exploited to
cause a heap-based buffer overflow by tricking a user into
opening a specially crafted WAV file. (CVE-2011-2911)

2) Boundary errors within the "CSoundFile::ReadS3M()"
function (src/load_s3m.cpp) when processing S3M files can
be exploited to cause stack-based buffer overflows by
tricking a user into opening a specially crafted S3M file.
(CVE-2011-2912)

3) An off-by-one error within the "CSoundFile::ReadAMS()"
function (src/load_ams.cpp) can be exploited to cause a
stack corruption by tricking a user into opening a
specially crafted AMS file. (CVE-2011-2913)

4) An off-by-one error within the "CSoundFile::ReadDSM()"
function (src/load_dms.cpp) can be exploited to cause a
memory corruption by tricking a user into opening a
specially crafted DSM file. (CVE-2011-2914)

5) An off-by-one error within the "CSoundFile::ReadAMS2()"
function (src/load_ams.cpp) can be exploited to cause a
memory corruption by tricking a user into opening a
specially crafted AMS file. (CVE-2011-2915)

Also an overflow in the ABC loader was fixed.
(CVE-2011-1761)

Fixed bugs
bnc#710726
VUL-0: libmodplug0: multiple vulnerabilities reported in <= 0.8.8.3
Selected Binaries
openSUSE Build Service is sponsored by