Security update for libmodplug

This update for libmodplug fixes the following issues:

Several security and non security issues where fixed:

- Update to version 0.8.9.0+git20170610.f6dd59a boo#1022032:
* PSM: add missing line to commit
* ABC: prevent possible increment of p past end
* ABC: ensure read pointer is valid before incrementing
* ABC: terminate early when things don't work in substitute
* OKT: add one more bound check
* FAR: out by one on check
* ABC: 10 digit ints require null termination
* PSM: make sure reads occur of only valid ins
* ABC: cleanup tracks correctly.
* WAV: check that there is space for both headers
* OKT: ensure file size is enough to contain data
* ABC: initialize earlier
* ABC: ensure array access is bounded correctly.
* ABC: clean up loop exiting code
* ABC: avoid possibility of incrementing *p
* ABC: abort early if macro would be blank
* ABC: Use blankline more often
* ABC: Ensure for loop does not increment past end of loop
* Initialize nPatterns to 0 earlier
* Check memory position isn't over the memory length
* ABC: transpose only needs to look at notes (<26)
* Spelling fixes
* Bump version number to 0.8.9.0
* MMCMP: Check that end pointer is within the file size
* WAV: ensure integer doesn't overflow
* XM: additional mempos check
* sndmix: Don't process row if its empty.
* snd_fx: dont include patterns of zero size in length calc
* MT2,AMF: prevent OOB reads

Fixed bugs
bnc#1022032
VUL-0: libmodplug: multiple vulnerabilities
Selected Binaries
openSUSE Build Service is sponsored by