-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2634
                        libopenmpt security update
                               3 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libopenmpt
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-17113  

Reference:         ESB-2020.2449
                   ESB-2019.3785

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2020/08/msg00003.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2308-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
August 02, 2020                             https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------

Package        : libopenmpt
Version        : 0.2.7386~beta20.3-3+deb9u4
CVE ID         : CVE-2019-17113


In libopenmpt before 0.3.19 and 0.4.x before 0.4.9,
ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c
do not restrict the lengths of libmodplug output-buffer strings in
the C API, leading to a buffer overflow.

For Debian 9 stretch, this problem has been fixed in version
0.2.7386~beta20.3-3+deb9u4.

We recommend that you upgrade your libopenmpt packages.

For the detailed security status of libopenmpt please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libopenmpt

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Best,
Utkarsh
- -----BEGIN PGP SIGNATURE-----
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=55B7
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXydg5eNLKJtyKPYoAQjtwxAAhxDRyl1+dB0/b3vWc9ej4MzyBdbuytgV
azPyCNZ5Y1/d9C+0g5dMXb38IwjpaqAZbbTDHuSUNAb7RoYGiqo4eXoEyVijnup4
2O/CNOxcW1OeveJ/b0zJq/N+Iq3opHj8oZhcugM3CZrMV2XSXZJVzj+Pz+GGf1yZ
CxHmVDLoNoTT8t0mtXGhFx4gzmpxgEQY3b4PzNA4T1DeMY66YWei9hvIsb5rU9r5
RSHwWfXlRUO1s+UCMgUaqIsuDgJTP2HVM//QH13qbBNORNtdMxSNIytT1HnG13Bz
QRwv3DH68s3bQWS3Q3lKOnSJLWX62Tsxx2oZsGH7Jq9EKgrulhxRKCbdWMI0esGt
KvAgJ2yJQ3fm3N4y3KT4wOGtKUyyxh0d9riUT0k087WWW48kBxKvExcWixkuoF9y
ikjjV/5Q12oITUjRL3kbj9MTHXxkNdyJ8FGgTtUV0MXI+bC/Uy83uNxqVdR87P4J
Ro2ch0u7Ayycn++oiJFLLtEjiZ/WH+kyeZbmdzPTdFUUDn/ly7XJPLn5/YbX7r9p
LVGkniUtlL0LVR2BRhPGkmXcDDXQdWB3fIvFhM5tfy/J3KemcMhM2piNthc6LPno
Q7j1QTv9G5TQtSBMmP5TA7kClIAZi74dzJHyc1NsdImUsarCGaaJn7y9YpFAa0hR
RmDVKk2WFd8=
=RYr9
-----END PGP SIGNATURE-----