openjpeg2: CVE-2016-10504: Heap-based buffer over-write in in opj_mqc_byteout function of mqc.c

Related Vulnerabilities: CVE-2016-10504   CVE-2017-14151  

Debian Bug report logs - #874113
openjpeg2: CVE-2016-10504: Heap-based buffer over-write in in opj_mqc_byteout function of mqc.c

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sun, 3 Sep 2017 12:27:02 UTC

Severity: important

Tags: fixed-upstream, patch, security, upstream

Found in versions openjpeg2/2.1.2-1.1, openjpeg2/2.1.2-1

Fixed in version openjpeg2/2.2.0-1

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Forwarded to https://github.com/uclouvain/openjpeg/issues/835

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian PhotoTools Maintainers <pkg-phototools-devel@lists.alioth.debian.org>:
Bug#874113; Package src:openjpeg2. (Sun, 03 Sep 2017 12:27:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian PhotoTools Maintainers <pkg-phototools-devel@lists.alioth.debian.org>. (Sun, 03 Sep 2017 12:27:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: openjpeg2: CVE-2016-10504: Heap-based buffer over-write in in opj_mqc_byteout function of mqc.c
Date: Sun, 03 Sep 2017 14:23:51 +0200
Source: openjpeg2
Version: 2.1.2-1.1
Severity: important
Tags: security upstream patch
Forwarded: https://github.com/uclouvain/openjpeg/issues/835

Hi,

the following vulnerability was published for openjpeg2.

CVE-2016-10504[0]:
| Heap-based buffer overflow vulnerability in the opj_mqc_byteout
| function in mqc.c in OpenJPEG before 2.2.0 allows remote attackers to
| cause a denial of service (application crash) via a crafted bmp file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-10504
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10504
[1] https://github.com/uclouvain/openjpeg/issues/835
[2] https://github.com/uclouvain/openjpeg/commit/397f62c0a838e15d667ef50e27d5d011d2c79c04

Please adjust the affected versions in the BTS as needed, only 2.1.2
has been verified so far.

Regards,
Salvatore



Added tag(s) fixed-upstream. Request was from bts-link-upstream@lists.alioth.debian.org to control@bugs.debian.org. (Thu, 07 Sep 2017 17:39:12 GMT) (full text, mbox, link).


Marked as fixed in versions openjpeg2/2.2.0-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 23 Sep 2017 07:30:06 GMT) (full text, mbox, link).


Marked Bug as done Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 23 Sep 2017 07:30:07 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sat, 23 Sep 2017 07:30:08 GMT) (full text, mbox, link).


Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#874113. (Sat, 23 Sep 2017 07:30:10 GMT) (full text, mbox, link).


Message #16 received at 874113-submitter@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: control@bugs.debian.org
Cc: 874113-submitter@bugs.debian.org
Subject: closing 874113
Date: Sat, 23 Sep 2017 09:23:05 +0200
close 874113 2.2.0-1
thanks




Marked as found in versions openjpeg2/2.1.2-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 23 Sep 2017 12:09:03 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian PhotoTools Maintainers <pkg-phototools-devel@lists.alioth.debian.org>:
Bug#874113; Package src:openjpeg2. (Mon, 23 Oct 2017 16:57:03 GMT) (full text, mbox, link).


Acknowledgement sent to Mathieu Malaterre <malat@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian PhotoTools Maintainers <pkg-phototools-devel@lists.alioth.debian.org>. (Mon, 23 Oct 2017 16:57:03 GMT) (full text, mbox, link).


Message #23 received at 874113@bugs.debian.org (full text, mbox, reply):

From: Mathieu Malaterre <malat@debian.org>
To: 874113@bugs.debian.org, 874430@bugs.debian.org
Cc: Debian Security Team <team@security.debian.org>
Subject: CVE-2016-10504 / CVE-2017-14151
Date: Mon, 23 Oct 2017 18:52:35 +0200
Control: notfound -1 2.1.0-2+deb8u2

I have been trying to track those related CVE and it appears that this
commit should avoid this kind of issue:

https://github.com/uclouvain/openjpeg/commit/3a80b72ac

(I had actually forgotten I authored this back then).

I think the issue was introducated later:

https://github.com/uclouvain/openjpeg/commit/e05d2901e

So I will not include the related patch.

Cheers



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 21 Nov 2017 07:25:16 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 18:37:18 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.