Debian Bug report logs -
#874113
openjpeg2: CVE-2016-10504: Heap-based buffer over-write in in opj_mqc_byteout function of mqc.c
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian PhotoTools Maintainers <pkg-phototools-devel@lists.alioth.debian.org>
:
Bug#874113
; Package src:openjpeg2
.
(Sun, 03 Sep 2017 12:27:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian PhotoTools Maintainers <pkg-phototools-devel@lists.alioth.debian.org>
.
(Sun, 03 Sep 2017 12:27:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: openjpeg2
Version: 2.1.2-1.1
Severity: important
Tags: security upstream patch
Forwarded: https://github.com/uclouvain/openjpeg/issues/835
Hi,
the following vulnerability was published for openjpeg2.
CVE-2016-10504[0]:
| Heap-based buffer overflow vulnerability in the opj_mqc_byteout
| function in mqc.c in OpenJPEG before 2.2.0 allows remote attackers to
| cause a denial of service (application crash) via a crafted bmp file.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2016-10504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10504
[1] https://github.com/uclouvain/openjpeg/issues/835
[2] https://github.com/uclouvain/openjpeg/commit/397f62c0a838e15d667ef50e27d5d011d2c79c04
Please adjust the affected versions in the BTS as needed, only 2.1.2
has been verified so far.
Regards,
Salvatore
Added tag(s) fixed-upstream.
Request was from bts-link-upstream@lists.alioth.debian.org
to control@bugs.debian.org
.
(Thu, 07 Sep 2017 17:39:12 GMT) (full text, mbox, link).
Marked as fixed in versions openjpeg2/2.2.0-1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Sat, 23 Sep 2017 07:30:06 GMT) (full text, mbox, link).
Marked Bug as done
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Sat, 23 Sep 2017 07:30:07 GMT) (full text, mbox, link).
Notification sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Bug acknowledged by developer.
(Sat, 23 Sep 2017 07:30:08 GMT) (full text, mbox, link).
Message sent on
to Salvatore Bonaccorso <carnil@debian.org>
:
Bug#874113.
(Sat, 23 Sep 2017 07:30:10 GMT) (full text, mbox, link).
Message #16 received at 874113-submitter@bugs.debian.org (full text, mbox, reply):
close 874113 2.2.0-1
thanks
Marked as found in versions openjpeg2/2.1.2-1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Sat, 23 Sep 2017 12:09:03 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian PhotoTools Maintainers <pkg-phototools-devel@lists.alioth.debian.org>
:
Bug#874113
; Package src:openjpeg2
.
(Mon, 23 Oct 2017 16:57:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Mathieu Malaterre <malat@debian.org>
:
Extra info received and forwarded to list. Copy sent to Debian PhotoTools Maintainers <pkg-phototools-devel@lists.alioth.debian.org>
.
(Mon, 23 Oct 2017 16:57:03 GMT) (full text, mbox, link).
Message #23 received at 874113@bugs.debian.org (full text, mbox, reply):
Control: notfound -1 2.1.0-2+deb8u2
I have been trying to track those related CVE and it appears that this
commit should avoid this kind of issue:
https://github.com/uclouvain/openjpeg/commit/3a80b72ac
(I had actually forgotten I authored this back then).
I think the issue was introducated later:
https://github.com/uclouvain/openjpeg/commit/e05d2901e
So I will not include the related patch.
Cheers
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org
.
(Tue, 21 Nov 2017 07:25:16 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 18:37:18 2019;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.