Bug#1014980: tinyexr: CVE-2018-12688 CVE-2018-12064 CVE-2022-34300

2022-09-08 Thread Timo Röhling

Hi,

On Fri, 15 Jul 2022 17:50:37 +0200 =?UTF-8?Q?Moritz_M=C3=BChlenhoff?= 
 wrote:

CVE-2018-12688[0]:
| tinyexr 0.9.5 has a segmentation fault in the wav2Decode function.

https://github.com/syoyo/tinyexr/issues/83

I cannot reproduce this.


CVE-2018-12064[1]:
| tinyexr 0.9.5 has a heap-based buffer over-read via
| tinyexr::ReadChannelInfo in tinyexr.h.

Doesn't seem to have been reported upstream so far:
https://github.com/ChijinZ/security_advisories/tree/master/tinyexr_7953aea

I cannot reproduce this either.


CVE-2022-34300[2]:
| In tinyexr 1.0.1, there is a heap-based buffer over-read in
| tinyexr::DecodePixelData.

https://github.com/syoyo/tinyexr/issues/167

I can confirm this bug, and I submitted a patch to upstream:
https://github.com/syoyo/tinyexr/pull/175


Cheers
Timo

--
⢀⣴⠾⠻⢶⣦⠀   ╭╮
⣾⠁⢠⠒⠀⣿⡁   │ Timo Röhling   │
⢿⡄⠘⠷⠚⠋⠀   │ 9B03 EBB9 8300 DF97 C2B1  23BF CC8C 6BDD 1403 F4CA │
⠈⠳⣄   ╰╯


signature.asc
Description: PGP signature


Bug#1014980: tinyexr: CVE-2018-12688 CVE-2018-12064 CVE-2022-34300

2022-07-15 Thread Moritz Mühlenhoff
Source: tinyexr
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for tinyexr.

CVE-2018-12688[0]:
| tinyexr 0.9.5 has a segmentation fault in the wav2Decode function.

https://github.com/syoyo/tinyexr/issues/83

CVE-2018-12064[1]:
| tinyexr 0.9.5 has a heap-based buffer over-read via
| tinyexr::ReadChannelInfo in tinyexr.h.

Doesn't seem to have been reported upstream so far:
https://github.com/ChijinZ/security_advisories/tree/master/tinyexr_7953aea

CVE-2022-34300[2]:
| In tinyexr 1.0.1, there is a heap-based buffer over-read in
| tinyexr::DecodePixelData.

https://github.com/syoyo/tinyexr/issues/167

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-12688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12688
[1] https://security-tracker.debian.org/tracker/CVE-2018-12064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12064
[2] https://security-tracker.debian.org/tracker/CVE-2022-34300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34300

Please adjust the affected versions in the BTS as needed.