DEBIAN-CVE-2019-17113

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2019-17113
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2019-17113.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2019-17113
Upstream
Published
2019-10-04T00:15:10Z
Modified
2025-09-19T06:11:15Z
Summary
[none]
Details

In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlugInstrumentName and ModPlugSampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow.

References

Affected packages

Debian:11 / libopenmpt

Package

Name
libopenmpt
Purl
pkg:deb/debian/libopenmpt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libopenmpt

Package

Name
libopenmpt
Purl
pkg:deb/debian/libopenmpt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libopenmpt

Package

Name
libopenmpt
Purl
pkg:deb/debian/libopenmpt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / libopenmpt

Package

Name
libopenmpt
Purl
pkg:deb/debian/libopenmpt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}