StackPatch is liveSee product

Back to CVE digest
Ubuntu USN · USN-8206-1

OpenMPT vulnerability

Published: Thu, 23 Apr 2026 16:05

CVE-2019-17113

Summary

OpenMPT could be made to crash if it received specially crafted input.

Details

Antonio Morales Maldonado discovered that OpenMPT did not properly limit the length of strings in certain cases, leading to a buffer overflow. An attacker could possibly use this issue to cause OpenMPT to crash, resulting in a denial of service.

Recommended actions per Ubuntu release

StackPatch playbook auto-generated per release codename and per affected package.

Ubuntu bionic

  • libopenmpt0.3.6-1ubuntu0.1~esm2apt_upgrade_esm

    Fixed at 0.3.6-1ubuntu0.1~esm2 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y libopenmpt=0.3.6-1ubuntu0.1~esm2

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • libopenmpt-dev0.3.6-1ubuntu0.1~esm2apt_upgrade_esm

    Fixed at 0.3.6-1ubuntu0.1~esm2 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y libopenmpt-dev=0.3.6-1ubuntu0.1~esm2

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • libopenmpt-doc0.3.6-1ubuntu0.1~esm2apt_upgrade_esm

    Fixed at 0.3.6-1ubuntu0.1~esm2 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y libopenmpt-doc=0.3.6-1ubuntu0.1~esm2

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • libopenmpt-modplug-dev0.3.6-1ubuntu0.1~esm2apt_upgrade_esm

    Fixed at 0.3.6-1ubuntu0.1~esm2 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y libopenmpt-modplug-dev=0.3.6-1ubuntu0.1~esm2

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • libopenmpt-modplug10.3.6-1ubuntu0.1~esm2apt_upgrade_esm

    Fixed at 0.3.6-1ubuntu0.1~esm2 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y libopenmpt-modplug1=0.3.6-1ubuntu0.1~esm2

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • libopenmpt00.3.6-1ubuntu0.1~esm2apt_upgrade_esm

    Fixed at 0.3.6-1ubuntu0.1~esm2 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y libopenmpt0=0.3.6-1ubuntu0.1~esm2

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • openmpt1230.3.6-1ubuntu0.1~esm2apt_upgrade_esm

    Fixed at 0.3.6-1ubuntu0.1~esm2 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y openmpt123=0.3.6-1ubuntu0.1~esm2

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

Are YOU affected by USN-8206-1?

5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether USN-8206-1 (and any other live CVE) applies. Anonymous, no signup.

curl https://mindsparkstack.com/scan.sh | bash
Want this automated for your servers?

StackPatch runs this match against YOUR installed packages every hour

Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.