Package name
Advisory ID
Affected versions
2008.0 i586 , 2008.0 x86_64

Problem description

Multiple security vulnerabilities has been identified and fixed
in libmodplug:

Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp)
in libmodplug before 0.8.6, as used in gstreamer-plugins and other
products, allows context-dependent attackers to execute arbitrary
code via a MED file with a crafted (1) song comment or (2) song name,
which triggers a heap-based buffer overflow (CVE-2009-1438).

Buffer overflow in the PATinst function in src/load_pat.cpp in
libmodplug before 0.8.7 allows user-assisted remote attackers to
cause a denial of service and possibly execute arbitrary code via a
long instrument name (CVE-2009-1513).

The updated packages have been patched to prevent this.


Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers

Updated packages

2008.0 i586

 9d7e4ce45987f8103e6e68ff6a789afa  2008.0/i586/libmodplug0-0.8.4-1.1mdv2008.0.i586.rpm
 65ca878fccad537bd0dcc8e7b6156d3a  2008.0/i586/libmodplug0-devel-0.8.4-1.1mdv2008.0.i586.rpm 
 496719add48603cf87e3a27025b5dabb  2008.0/SRPMS/libmodplug-0.8.4-1.1mdv2008.0.src.rpm

2008.0 x86_64

 4e456e05bc59c08a0a0adaf7a2ccce37  2008.0/x86_64/lib64modplug0-0.8.4-1.1mdv2008.0.x86_64.rpm
 389e7edbacb029bcd9afef7cf4a9ba0e  2008.0/x86_64/lib64modplug0-devel-0.8.4-1.1mdv2008.0.x86_64.rpm 
 496719add48603cf87e3a27025b5dabb  2008.0/SRPMS/libmodplug-0.8.4-1.1mdv2008.0.src.rpm