Bug#1014980: tinyexr: CVE-2018-12688 CVE-2018-12064 CVE-2022-34300
Hi, On Fri, 15 Jul 2022 17:50:37 +0200 =?UTF-8?Q?Moritz_M=C3=BChlenhoff?= wrote: CVE-2018-12688[0]: | tinyexr 0.9.5 has a segmentation fault in the wav2Decode function. https://github.com/syoyo/tinyexr/issues/83 I cannot reproduce this. CVE-2018-12064[1]: | tinyexr 0.9.5 has a heap-based buffer over-read via | tinyexr::ReadChannelInfo in tinyexr.h. Doesn't seem to have been reported upstream so far: https://github.com/ChijinZ/security_advisories/tree/master/tinyexr_7953aea I cannot reproduce this either. CVE-2022-34300[2]: | In tinyexr 1.0.1, there is a heap-based buffer over-read in | tinyexr::DecodePixelData. https://github.com/syoyo/tinyexr/issues/167 I can confirm this bug, and I submitted a patch to upstream: https://github.com/syoyo/tinyexr/pull/175 Cheers Timo -- ⢀⣴⠾⠻⢶⣦⠀ ╭╮ ⣾⠁⢠⠒⠀⣿⡁ │ Timo Röhling │ ⢿⡄⠘⠷⠚⠋⠀ │ 9B03 EBB9 8300 DF97 C2B1 23BF CC8C 6BDD 1403 F4CA │ ⠈⠳⣄ ╰╯ signature.asc Description: PGP signature
Bug#1014980: tinyexr: CVE-2018-12688 CVE-2018-12064 CVE-2022-34300
Source: tinyexr X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerabilities were published for tinyexr. CVE-2018-12688[0]: | tinyexr 0.9.5 has a segmentation fault in the wav2Decode function. https://github.com/syoyo/tinyexr/issues/83 CVE-2018-12064[1]: | tinyexr 0.9.5 has a heap-based buffer over-read via | tinyexr::ReadChannelInfo in tinyexr.h. Doesn't seem to have been reported upstream so far: https://github.com/ChijinZ/security_advisories/tree/master/tinyexr_7953aea CVE-2022-34300[2]: | In tinyexr 1.0.1, there is a heap-based buffer over-read in | tinyexr::DecodePixelData. https://github.com/syoyo/tinyexr/issues/167 If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-12688 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12688 [1] https://security-tracker.debian.org/tracker/CVE-2018-12064 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12064 [2] https://security-tracker.debian.org/tracker/CVE-2022-34300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34300 Please adjust the affected versions in the BTS as needed.