Debian: DSA-1850-1: New libmodplug packages fix arbitrary code execution

    Date04 Aug 2009
    CategoryDebian
    60
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in libmodplug, the shared libraries for mod music based on ModPlug. The Common Vulnerabilities and Exposures project identifies the following problems:
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1850-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    	
    http://www.debian.org/security/                      Steffen Joeris
    August 04, 2009                       http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : libmodplug
    Vulnerability  : several
    Problem type   : local (remote)
    Debian-specific: no
    CVE Ids        : CVE-2009-1438 CVE-2009-1513
    Debian Bugs    : 526657 527076 526084
    
    Several vulnerabilities have been discovered in libmodplug, the shared
    libraries for mod music based on ModPlug. The Common Vulnerabilities and
    Exposures project identifies the following problems:
    
    CVE-2009-1438
    
    It was discovered that libmodplug is prone to an integer overflow when
    processing a MED file with a crafted song comment or song name.
    
    CVE-2009-1513
    
    It was discovered that libmodplug is prone to a buffer overflow in the
    PATinst function, when processing a long instrument name.
    
    
    For the stable distribution (lenny), these problems have been fixed in
    version 1:0.8.4-1+lenny1.
    
    For the oldstable distribution (etch), these problems have been fixed in
    version 1:0.7-5.2+etch1.
    
    For the testing distribution (squeeze) and the unstable distribution
    (sid), this problem has been fixed in version 1:0.8.7-1.
    
    
    We recommend that you upgrade your libmodplug packages.
    
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
    Debian (oldstable)
    - ------------------
    
    Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug_0.7.orig.tar.gz
        Size/MD5 checksum:   329398 b6e7412f90cdd4a27a2dd3de94909905
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug_0.7-5.2+etch1.diff.gz
        Size/MD5 checksum:     8039 bbab9bd58551171e2e06667a34c142c6
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug_0.7-5.2+etch1.dsc
        Size/MD5 checksum:      639 d1038e62643d55d6f828cf35b79de0b8
    
    Architecture independent packages:
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug-dev_0.7-5.2+etch1_all.deb
        Size/MD5 checksum:    22662 4f1054f141eed8596aef8c3ee9cb53e0
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_alpha.deb
        Size/MD5 checksum:   164658 66dcec99183876eb3d51ef21f94074c3
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_amd64.deb
        Size/MD5 checksum:   116020 51d8c8c88ca40f4bb84db1e19212d22f
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_arm.deb
        Size/MD5 checksum:   128564 abea81a9204331d379d19266ae9c2ce4
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_hppa.deb
        Size/MD5 checksum:   140852 e7123f04da964f983c470e0e8b45541f
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_i386.deb
        Size/MD5 checksum:   118570 3daea649fff6afd586e038c2e1adefbf
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_ia64.deb
        Size/MD5 checksum:   193278 66a63c49a06104bfb6e2a433b3965cd6
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_mips.deb
        Size/MD5 checksum:   128172 437a45a7f44be2ef5d0427a8d48ca3a3
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_mipsel.deb
        Size/MD5 checksum:   126328 b1e89e5a36757efa0872218ef65aac97
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_powerpc.deb
        Size/MD5 checksum:   125400 3832485316da7189f10a92ee9a5b9631
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_s390.deb
        Size/MD5 checksum:   128602 ea7389863995e8c6637aaff4a1451449
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.7-5.2+etch1_sparc.deb
        Size/MD5 checksum:   123960 19482ae9a363ee1c4eace02781bbdf16
    
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Debian (stable)
    - ---------------
    
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug_0.8.4-1+lenny1.dsc
        Size/MD5 checksum:     1060 a36f490b6a4e963775577e175b23dd59
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug_0.8.4-1+lenny1.diff.gz
        Size/MD5 checksum:     8031 d8e0a3b87cf946c99641103741f47e35
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug_0.8.4.orig.tar.gz
        Size/MD5 checksum:   510758 091bd1168a524a4f36fc61f95209e7e4
    
    Architecture independent packages:
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug-dev_0.8.4-1+lenny1_all.deb
        Size/MD5 checksum:    24776 553b9aa5cddc17736613b981924c3022
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_alpha.deb
        Size/MD5 checksum:   253172 d4531bd79e7073ac5910d7bb0afed53b
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_amd64.deb
        Size/MD5 checksum:   173448 f78dd0d43b1dfcc5f7fbce292bfbf4fb
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_arm.deb
        Size/MD5 checksum:   186076 af4e4880d2a5fe3173f7ecad4a4f6e10
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_armel.deb
        Size/MD5 checksum:   182470 3ebd0c108b3a223e46996f54a12a5067
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_i386.deb
        Size/MD5 checksum:   171752 6b198e2b26666d92c59bac1eaf6dfd04
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_ia64.deb
        Size/MD5 checksum:   321748 9d771a479ddb9cc4338a47617c21e4aa
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_mips.deb
        Size/MD5 checksum:   186890 6d44ee961d8c5e2b4477a6ff12111b99
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_mipsel.deb
        Size/MD5 checksum:   185528 96d30ac3d8a55068e9ad2d065f3831ba
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_powerpc.deb
        Size/MD5 checksum:   187332 f0151664a380507749527c06f398ba63
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_s390.deb
        Size/MD5 checksum:   190242 fe35d852302407bbfb538c09d213790b
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/libm/libmodplug/libmodplug0c2_0.8.4-1+lenny1_sparc.deb
        Size/MD5 checksum:   187802 b54d03502f1c783431c3ee8cfc03274c
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"37","type":"x","order":"1","pct":51.39,"resources":[]},{"id":"88","title":"Should be more technical","votes":"10","type":"x","order":"2","pct":13.89,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"25","type":"x","order":"3","pct":34.72,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.