[Pkg-phototools-devel] Bug#731237: openjpeg: CVE-2013-1447 CVE-2013-6045 CVE-2013-6052 CVE-2013-6054

2013-12-03 Thread Salvatore Bonaccorso
Package: openjpeg
Severity: grave
Tags: security upstream patch

Hi

This is to track the issues released with DSA-2808-1 for openjpeg in
the BTS. See

 http://lists.debian.org/debian-security-announce/2013/msg00222.html
 http://www.debian.org/security/2013/dsa-2808

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#743372: openjpeg: CVE-2014-0158: Heap-based buffer overflow in JPEG2000 image tile decoder

2014-04-02 Thread Salvatore Bonaccorso
Source: openjpeg
Severity: grave
Tags: security upstream

Hi,

the following vulnerability was published for openjpeg.

CVE-2014-0158[0]:
Heap-based buffer overflow in JPEG2000 image tile decoder

More information are on the Red Hat bugzilla[1].

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0158
https://security-tracker.debian.org/tracker/CVE-2014-0158
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1082925

Please adjust the affected versions in the BTS as needed. I only
quickly checked unstable which seems to apply. Could you check if
oldstable and stable are also affected by this problem?

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#786792: darktable: CVE-2015-3885: input sanitization flaw leading to buffer overflow

2015-05-25 Thread Salvatore Bonaccorso
Source: darktable
Version: 1.0.4-1
Severity: important
Tags: security upstream

Hi,

the following vulnerability was published for darktable.

CVE-2015-3885[0]:
| Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier
| allows remote attackers to cause a denial of service (crash) via a
| crafted image, which triggers a buffer overflow, related to the len
| variable.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-3885
[1] http://www.ocert.org/advisories/ocert-2015-006.html

This does not seem to warrant a DSA, but it would be nice to have it
fixed in jessie and wheezy as well. Could you contact the stable
release managers to have an update through a wheezy- and
jessie-proposed-update?

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#800149: openjpeg2: Use-after-free in opj_j2k_write_mco

2015-09-27 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.0-2
Severity: important
Tags: security upstream patch fixed-upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/563

Hi

A use-after-free vulnerability was found in openjpeg2, see
http://www.openwall.com/lists/oss-security/2015/09/15/4 for the
corresponding CVE request (no CVE assigned so far).

Upstream issue: https://github.com/uclouvain/openjpeg/issues/563

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#801700: optipng: CVE-2015-7802: Buffer overflow in global memory

2015-10-13 Thread Salvatore Bonaccorso
Source: optipng
Version: 0.7.5-1
Severity: important
Tags: security upstream

Hi,

the following vulnerability was published for optipng.

CVE-2015-7802[0]:
Buffer overflow in global memory

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-7802
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1265956
[2] https://marc.info/?l=oss-security&m=144300993420279&w=2

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#820068: optipng: CVE-2016-2191: Invalid write while processing delta escapes without any boundary checking

2016-04-05 Thread Salvatore Bonaccorso
Source: optipng
Version: 0.6.4-1
Severity: important
Tags: security upstream fixed-upstream
Forwarded: https://sourceforge.net/p/optipng/bugs/59/

Hi,

the following vulnerability was published for optipng and is fixed
in 0.7.6 upstream.

CVE-2016-2191[0]:
Invalid write while processing delta escapes without any boundary checking

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-2191
[1] https://sourceforge.net/p/optipng/bugs/59/
[2] https://bugzilla.redhat.com/show_bug.cgi?id=1308550

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#820068: optipng: diff for NMU version 0.7.5-1.1

2016-04-07 Thread Salvatore Bonaccorso
Control: tags 820068 + patch
Control: tags 820068 + pending

Dear maintainer,

I've prepared an NMU for optipng (versioned as 0.7.5-1.1) and uploaded
it to DELAYED/2. Please feel free to tell me if I should delay it
longer. It is exactly the same patch as used by Moritz for the
jessie-security upload. Better would be though to straight go to 0.7.6.

Regards,
Salvatore
diff -Nru optipng-0.7.5/debian/changelog optipng-0.7.5/debian/changelog
--- optipng-0.7.5/debian/changelog	2014-06-11 13:48:44.0 +0200
+++ optipng-0.7.5/debian/changelog	2016-04-08 06:53:53.0 +0200
@@ -1,3 +1,12 @@
+optipng (0.7.5-1.1) unstable; urgency=high
+
+  * Non-maintainer upload.
+  * CVE-2016-2191: Invalid write while processing delta escapes without
+any boundary checking (Patch from Moritz Muehlenhoff from the jessie-
+security upload) (Closes: #820068)
+
+ -- Salvatore Bonaccorso   Fri, 08 Apr 2016 06:26:14 +0200
+
 optipng (0.7.5-1) unstable; urgency=medium
 
   * New upstream release (Closes: #687770)
diff -Nru optipng-0.7.5/debian/patches/CVE-2016-2191.patch optipng-0.7.5/debian/patches/CVE-2016-2191.patch
--- optipng-0.7.5/debian/patches/CVE-2016-2191.patch	1970-01-01 01:00:00.0 +0100
+++ optipng-0.7.5/debian/patches/CVE-2016-2191.patch	2016-04-08 06:53:53.0 +0200
@@ -0,0 +1,140 @@
+Description: CVE-2016-2191: Invalid write while processing delta escapes without any boundary checking
+Origin: upstream
+Bug: https://sourceforge.net/p/optipng/bugs/59/
+Bug-Debian: https://bugs.debian.org/820068
+Forwarded: not-needed
+Author: Moritz Muehlenhoff 
+Last-Update: 2016-04-08
+Applied-Upstream: 0.7.6
+
+--- optipng-0.7.5.orig/src/pngxtern/pngxrbmp.c
 optipng-0.7.5/src/pngxtern/pngxrbmp.c
+@@ -108,17 +108,17 @@ bmp_get_dword(png_bytep ptr)
+ 
+ 
+ /*/
+-/* BMP RLE helpers   */
++/* BMP helpers   */
+ /*/
+ 
+ static void
+-bmp_rle8_memset(png_bytep ptr, size_t offset, int ch, size_t len)
++bmp_memset_bytes(png_bytep ptr, size_t offset, int ch, size_t len)
+ {
+memset(ptr + offset, ch, len);
+ }
+ 
+ static void
+-bmp_rle4_memset(png_bytep ptr, size_t offset, int ch, size_t len)
++bmp_memset_halfbytes(png_bytep ptr, size_t offset, int ch, size_t len)
+ {
+if (len == 0)
+   return;
+@@ -136,7 +136,7 @@ bmp_rle4_memset(png_bytep ptr, size_t of
+ }
+ 
+ static size_t
+-bmp_rle8_fread(png_bytep ptr, size_t offset, size_t len, FILE *stream)
++bmp_fread_bytes(png_bytep ptr, size_t offset, size_t len, FILE *stream)
+ {
+size_t result;
+ 
+@@ -147,15 +147,17 @@ bmp_rle8_fread(png_bytep ptr, size_t off
+ }
+ 
+ static size_t
+-bmp_rle4_fread(png_bytep ptr, size_t offset, size_t len, FILE *stream)
++bmp_fread_halfbytes(png_bytep ptr, size_t offset, size_t len, FILE *stream)
+ {
+size_t result;
+int ch;
+ 
++   if (len == 0)
++  return 0;
+ptr += offset / 2;
+if (offset & 1)  /* use half-byte operations at odd offset */
+{
+-  for (result = 0; result < len; result += 2)
++  for (result = 0; result < len - 1; result += 2)
+   {
+  ch = getc(stream);
+  if (ch == EOF)
+@@ -231,14 +233,14 @@ bmp_read_rows(png_bytepp begin_row, png_
+   endn = row_size * 2;
+   if (endn <= row_size)
+  return 0;  /* overflow */
+-  bmp_memset_fn = bmp_rle4_memset;
+-  bmp_fread_fn = bmp_rle4_fread;
++  bmp_memset_fn = bmp_memset_halfbytes;
++  bmp_fread_fn = bmp_fread_halfbytes;
+}
+else
+{
+   endn = row_size;
+-  bmp_memset_fn = bmp_rle8_memset;
+-  bmp_fread_fn = bmp_rle8_fread;
++  bmp_memset_fn = bmp_memset_bytes;
++  bmp_fread_fn = bmp_fread_bytes;
+}
+ 
+if (compression == BI_RGB || compression == BI_BITFIELDS)
+@@ -258,19 +260,14 @@ bmp_read_rows(png_bytepp begin_row, png_
+   if (compression == BI_RLE8)
+   {
+  endn = row_size;
+- bmp_memset_fn = bmp_rle8_memset;
+- bmp_fread_fn = bmp_rle8_fread;
+   }
+-  else /* BI_RLE4 */
++  else  /* BI_RLE4 */
+   {
+  endn = row_size * 2;
+  if (endn <= row_size)
+ return 0;  /* overflow */
+- bmp_memset_fn = bmp_rle4_memset;
+- bmp_fread_fn = bmp_rle4_fread;
+   }
+-  crt_row = begin_row;
+-  for ( ; ; )
++  for (crt_row = begin_row; crt_row != end_row; )
+   {
+  ch = getc(stream); b1 = (unsigned int)ch;
+  ch = getc(stream); b2 = (unsigned int)ch;
+@@ -300,6 +297,7 @@ bmp_read_rows(png_bytepp begin_row, png_
+ {
+bmp_memset_fn(*crt_row, crtn, 0, endn - crtn);
+crt_row += inc;
++   crtn = 0;
+result = (begin_row <= end_row) ?
+   

[Pkg-phototools-devel] Bug#820068: optipng: diff for NMU version 0.7.5-1.1

2016-04-08 Thread Salvatore Bonaccorso
Hi

The used patch took into account as well the fixed from upstream bugs
56 and 57, which correspond to CVE-2016-3981 and CVE-2016-3982. At the
time of writing those two CVEs were not yet assigned.

So once accepted into the archive, I will update as well the
information for those CVEs.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#800149: openjpeg2: Use-after-free in opj_j2k_write_mco

2016-05-12 Thread Salvatore Bonaccorso
Control: retitle -1 openjpeg2: CVE-2015-8871: Use-after-free in 
opj_j2k_write_mco

Hi,

On Sun, Sep 27, 2015 at 01:54:25PM +0200, Salvatore Bonaccorso wrote:
> Source: openjpeg2
> Version: 2.1.0-2
> Severity: important
> Tags: security upstream patch fixed-upstream
> Forwarded: https://github.com/uclouvain/openjpeg/issues/563
> 
> Hi
> 
> A use-after-free vulnerability was found in openjpeg2, see
> http://www.openwall.com/lists/oss-security/2015/09/15/4 for the
> corresponding CVE request (no CVE assigned so far).
> 
> Upstream issue: https://github.com/uclouvain/openjpeg/issues/563

This issue has been assigned CVE-2015-8871.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#831814: lepton: CVE-2016-6234 CVE-2016-6235 CVE-2016-6236 CVE-2016-6237 CVE-2016-6238

2016-07-19 Thread Salvatore Bonaccorso
Source: lepton
Version: 1.0-2
Severity: grave
Tags: security upstream
Justification: user security hole

Hi,

Multiple issues were found in lepton. The CVE request was at
http://www.openwall.com/lists/oss-security/2016/07/17/1 referencing
https://github.com/dropbox/lepton/issues/26 (note to compile with
address sanitizer to reproduce the issues).

lepton got several CVE assigned in subsequent
http://www.openwall.com/lists/oss-security/2016/07/17/6

I'm not sure if current master fixes all the reported cases from #26.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#837604: openjpeg2: CVE-2016-7163: Integer overflow in opj_pi_create_decode

2016-09-12 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.0-2
Severity: grave
Tags: security upstream patch
Control: fixed -1 2.1.0-2+deb8u1

Hi,

the following vulnerability was published for openjpeg2.

CVE-2016-7163[0]:
Integer overflow in opj_pi_create_decode

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-7163

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#844552: openjpeg2: CVE-2016-9113

2016-11-16 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.2-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/856

Hi,

the following vulnerability was published for openjpeg2.

CVE-2016-9113[0]:
| There is a NULL pointer dereference in function imagetobmp of
| convertbmp.c:980 of OpenJPEG 2.1.2. image->comps[0].data is not
| assigned a value after initialization(NULL). Impact is Denial of
| Service.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-9113
[1] https://github.com/uclouvain/openjpeg/issues/856

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#844551: openjpeg2: CVE-2016-9112

2016-11-16 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.2-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/855

Hi,

the following vulnerability was published for openjpeg2.

CVE-2016-9112[0]:
| Floating Point Exception (aka FPE or divide by zero) in
| opj_pi_next_cprl function in openjp2/pi.c:523 in OpenJPEG 2.1.2.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-9112
[1] https://github.com/uclouvain/openjpeg/issues/855

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#844554: openjpeg2: CVE-2016-9115

2016-11-16 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.2-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/858

Hi,

the following vulnerability was published for openjpeg2.

CVE-2016-9115[0]:
| Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in
| OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a
| crafted j2k file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-9115
[1] https://github.com/uclouvain/openjpeg/issues/858

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#844555: openjpeg2: CVE-2016-9116

2016-11-16 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.2-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/859

Hi,

the following vulnerability was published for openjpeg2.

CVE-2016-9116[0]:
| NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) in
| OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a
| crafted j2k file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-9116
[1] https://github.com/uclouvain/openjpeg/issues/859

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#844553: openjpeg2: CVE-2016-9114

2016-11-16 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.2-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/857

Hi,

the following vulnerability was published for openjpeg2.

CVE-2016-9114[0]:
| There is a NULL Pointer Access in function imagetopnm of
| convert.c:1943(jp2) of OpenJPEG 2.1.2. image->comps[compno].data is not
| assigned a value after initialization(NULL). Impact is Denial of
| Service.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-9114
[1] https://github.com/uclouvain/openjpeg/issues/857

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#844557: openjpeg2: CVE-2016-9118

2016-11-16 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.2-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/861

Hi,

the following vulnerability was published for openjpeg2.

CVE-2016-9118[0]:
| Heap Buffer Overflow (WRITE of size 4) in function pnmtoimage of
| convert.c:1719 in OpenJPEG 2.1.2.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-9118
[1] https://github.com/uclouvain/openjpeg/issues/861

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#844556: openjpeg2: CVE-2016-9117

2016-11-16 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.2-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/860

Hi,

the following vulnerability was published for openjpeg2.

CVE-2016-9117[0]:
| NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 in
| OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a
| crafted j2k file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-9117
[1] https://github.com/uclouvain/openjpeg/issues/860

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#851422: openjpeg2: CVE-2016-9572 CVE-2016-9573

2017-01-14 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.0-2
Severity: grave
Tags: security upstream patch
Justification: user security hole
Forwarded: https://github.com/uclouvain/openjpeg/issues/863
Control: fixed -1 2.1.0-2+deb8u2

Hi,

the following vulnerabilities were published for openjpeg2. Filling it
as RC severity, since Moritz's DSA for openjpeg2 will contain fixes
for those two CVEs, and not having those fixed in stretch would imply
a regression.

CVE-2016-9572[0] and CVE-2016-9573[1]. There is an upstream issue at
[2] with patch[3].

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-9572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572
[1] https://security-tracker.debian.org/tracker/CVE-2016-9573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573
[2] https://github.com/uclouvain/openjpeg/issues/863
[3] 
https://github.com/szukw000/openjpeg/commit/7b28bd2b723df6be09fe7791eba33147c1c47d0d

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#851422: openjpeg2: diff for NMU version 2.1.2-1.1

2017-01-22 Thread Salvatore Bonaccorso
Control: tags 851422 + pending

Dear maintainer,

I've prepared an NMU for openjpeg2 (versioned as 2.1.2-1.1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.

Regards,
Salvatore
diff -Nru openjpeg2-2.1.2/debian/changelog openjpeg2-2.1.2/debian/changelog
--- openjpeg2-2.1.2/debian/changelog	2016-09-29 08:11:30.0 +0200
+++ openjpeg2-2.1.2/debian/changelog	2017-01-22 14:18:13.0 +0100
@@ -1,3 +1,13 @@
+openjpeg2 (2.1.2-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Add CVE-2016-9572_CVE-2016-9573.patch patch.
+CVE-2016-9572: NULL pointer dereference in input decoding
+CVE-2016-9573: Heap out-of-bounds read due to insufficient check in
+imagetopnm(). (Closes: #851422)
+
+ -- Salvatore Bonaccorso   Sun, 22 Jan 2017 14:18:13 +0100
+
 openjpeg2 (2.1.2-1) unstable; urgency=medium
 
   * New upstream. Closes: #839120
diff -Nru openjpeg2-2.1.2/debian/patches/CVE-2016-9572_CVE-2016-9573.patch openjpeg2-2.1.2/debian/patches/CVE-2016-9572_CVE-2016-9573.patch
--- openjpeg2-2.1.2/debian/patches/CVE-2016-9572_CVE-2016-9573.patch	1970-01-01 01:00:00.0 +0100
+++ openjpeg2-2.1.2/debian/patches/CVE-2016-9572_CVE-2016-9573.patch	2017-01-22 14:18:13.0 +0100
@@ -0,0 +1,222 @@
+From 7b28bd2b723df6be09fe7791eba33147c1c47d0d Mon Sep 17 00:00:00 2001
+From: szukw000 
+Date: Mon, 28 Nov 2016 21:57:20 +0100
+Subject: [PATCH] Changes for issues #863 and #862
+
+---
+ src/bin/jp2/convert.c| 59 +++-
+ src/bin/jp2/convertbmp.c | 29 +-
+ src/bin/jp2/opj_decompress.c |  2 +-
+ src/lib/openjp2/j2k.c| 11 ++---
+ 4 files changed, 90 insertions(+), 11 deletions(-)
+
+diff --git a/src/bin/jp2/convert.c b/src/bin/jp2/convert.c
+index deee4f6..6a3f65b 100644
+--- a/src/bin/jp2/convert.c
 b/src/bin/jp2/convert.c
+@@ -906,7 +906,8 @@ int imagetotga(opj_image_t * image, const char *outfile) {
+ for (i = 0; i < image->numcomps-1; i++)	{
+ if ((image->comps[0].dx != image->comps[i+1].dx)
+ ||(image->comps[0].dy != image->comps[i+1].dy)
+-||(image->comps[0].prec != image->comps[i+1].prec))	{
++||(image->comps[0].prec != image->comps[i+1].prec)
++||(image->comps[0].sgnd != image->comps[i+1].sgnd))	{
+ fclose(fdest);
+ fprintf(stderr, "Unable to create a tga file with such J2K image charateristics.");
+ return 1;
+@@ -1743,7 +1744,7 @@ int imagetopnm(opj_image_t * image, const char *outfile, int force_split)
+ int *red, *green, *blue, *alpha;
+ int wr, hr, max;
+ int i;
+-unsigned int compno, ncomp;
++unsigned int compno, ncomp, ui;
+ int adjustR, adjustG, adjustB, adjustA;
+ int fails, two, want_gray, has_alpha, triple;
+ int prec, v;
+@@ -1768,6 +1769,27 @@ int imagetopnm(opj_image_t * image, const char *outfile, int force_split)
+ 
+ if(want_gray) ncomp = 1;
+ 
++for (ui = 1; ui < ncomp; ++ui) {
++if (image->comps[0].dx != image->comps[ui].dx) {
++break;
++}
++if (image->comps[0].dy != image->comps[ui].dy) {
++break;
++}
++if (image->comps[0].prec != image->comps[ui].prec) {
++break;
++}
++if (image->comps[0].sgnd != image->comps[ui].sgnd) {
++break;
++}
++}
++if (ui != ncomp) {
++fprintf(stderr,"imagetopnm: All components\nshall have "
++ "the same subsampling, same bit depth, same sign.\n"
++ "Aborting\n");
++return 1;
++}
++
+ if ((force_split == 0) &&
+ (ncomp == 2 /* GRAYA */
+ || (ncomp > 2 /* RGB, RGBA */
+@@ -2126,7 +2148,7 @@ static int imagetoraw_common(opj_image_t * image, const char *outfile, OPJ_BOOL
+ {
+ FILE *rawFile = NULL;
+ size_t res;
+-unsigned int compno;
++unsigned int compno, numcomps;
+ int w, h, fails;
+ int line, row, curr, mask;
+ int *ptr;
+@@ -2139,6 +2161,31 @@ static int imagetoraw_common(opj_image_t * image, const char *outfile, OPJ_BOOL
+ return 1;
+ }
+ 
++numcomps = image->numcomps;
++
++if (numcomps > 4) {
++numcomps = 4;
++}
++for (compno = 1; compno < numcomps; ++compno) {
++if (image->comps[0].dx != image->comps[compno].dx) {
++break;
++}
++if (image->comps[0].dy != image->comps[compno].dy) {
++break;
++}
++if (image->comps[0].prec != image->comps[compno].prec) {
++break;
++}
++if (image->comps[0].sgnd != image->comps[compno].sgnd) {
++break;
++}
++}
++if (compno != numcomps) {
++fprintf(stderr,"imagetoraw_common: All components shall have the same subsampling, same

[Pkg-phototools-devel] Bug#859714: lepton: CVE-2017-7448

2017-04-06 Thread Salvatore Bonaccorso
Source: lepton
Version: 1.2.1-2
Severity: important
Tags: security upstream patch
Forwarded: https://github.com/dropbox/lepton/issues/86

Hi,

the following vulnerability was published for lepton.

CVE-2017-7448[0]:
| The allocate_channel_framebuffer function in uncompressed_components.hh
| in Dropbox Lepton 1.2.1 allows remote attackers to cause a denial of
| service (divide-by-zero error and application crash) via a malformed
| JPEG image.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-7448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7448
[1] https://github.com/dropbox/lepton/issues/86

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

-- System Information:
Debian Release: 9.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=UTF-8) (ignored: LC_ALL set to C.UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#860367: feh: CVE-2017-7875

2017-04-15 Thread Salvatore Bonaccorso
Source: feh
Version: 2.12-1
Severity: normal
Tags: upstream security patch fixed-upstream

Hi,

the following vulnerability was published for fehl.

CVE-2017-7875[0]:
| In wallpaper.c in feh before v2.18.3, if a malicious client pretends to
| be the E17 window manager, it is possible to trigger an out-of-boundary
| heap write while receiving an IPC message. An integer overflow leads to
| a buffer overflow and/or a double free.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-7875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7875
[1] https://github.com/derf/feh/commit/f7a547b7ef8fc8ebdeaa4c28515c9d72e592fb6d

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#862446: lepton: CVE-2017-8891

2017-05-12 Thread Salvatore Bonaccorso
Source: lepton
Version: 1.2.1-2
Severity: important
Tags: upstream security
Forwarded: https://github.com/dropbox/lepton/issues/87

Hi,

the following vulnerability was published for lepton.

CVE-2017-8891[0]:
| Dropbox Lepton 1.2.1 allows DoS (SEGV and application crash) via a
| malformed lepton file because the code does not ensure setup of a
| correct number of threads.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-8891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8891
[1] https://github.com/dropbox/lepton/issues/87

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#873022: libexif: CVE-2016-6328: Integer overflow in parsing MNOTE entry data of the input file

2017-08-23 Thread Salvatore Bonaccorso
Source: libexif
Version: 0.6.21-2
Severity: important
Tags: security patch upstream

Hi,

the following vulnerability was published for libexif.

CVE-2016-6328[0]:
|Integer overflow in parsing MNOTE entry data of the input file

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-6328
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6328
[1] 
http://libexif.cvs.sourceforge.net/viewvc/libexif/libexif/libexif/pentax/mnote-pentax-entry.c?r1=1.26&r2=1.27

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#874113: openjpeg2: CVE-2016-10504: Heap-based buffer over-write in in opj_mqc_byteout function of mqc.c

2017-09-03 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.2-1.1
Severity: important
Tags: security upstream patch
Forwarded: https://github.com/uclouvain/openjpeg/issues/835

Hi,

the following vulnerability was published for openjpeg2.

CVE-2016-10504[0]:
| Heap-based buffer overflow vulnerability in the opj_mqc_byteout
| function in mqc.c in OpenJPEG before 2.2.0 allows remote attackers to
| cause a denial of service (application crash) via a crafted bmp file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-10504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10504
[1] https://github.com/uclouvain/openjpeg/issues/835
[2] 
https://github.com/uclouvain/openjpeg/commit/397f62c0a838e15d667ef50e27d5d011d2c79c04

Please adjust the affected versions in the BTS as needed, only 2.1.2
has been verified so far.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#874115: openjpeg2: CVE-2017-14041: Stack-based buffer over-write in pgxtoimage function in bin/jp2/convert.c

2017-09-03 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.0-2
Severity: grave
Tags: upstream patch security
Forwarded: https://github.com/uclouvain/openjpeg/issues/997

Hi,

the following vulnerability was published for openjpeg2.

CVE-2017-14041[0]:
| A stack-based buffer overflow was discovered in the pgxtoimage function
| in bin/jp2/convert.c in OpenJPEG 2.2.0. The vulnerability causes an
| out-of-bounds write, which may lead to remote denial of service or
| possibly remote code execution.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041
[1] https://github.com/uclouvain/openjpeg/issues/997
[2] 
https://github.com/uclouvain/openjpeg/commit/e5285319229a5d77bf316bb0d3a6cbd3cb8666d9

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#874117: openjpeg2: CVE-2017-14040: invalid memory write in tgatoimage

2017-09-03 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.0-2
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/995

Hi,

the following vulnerability was published for openjpeg2.

CVE-2017-14040[0]:
| An invalid write access was discovered in bin/jp2/convert.c in OpenJPEG
| 2.2.0, triggering a crash in the tgatoimage function. The vulnerability
| may lead to remote denial of service or possibly unspecified other
| impact.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040
[1] https://github.com/uclouvain/openjpeg/issues/995
[2] 
https://github.com/uclouvain/openjpeg/commit/2cd30c2b06ce332dede81cccad8b334cde997281

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#874118: openjpeg2: CVE-2017-14039: Heap-based buffer overflow in opj_t2_encode_packet function in lib/openjp2/t2.c

2017-09-03 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.0-2
Severity: important
Tags: patch upstream security
Forwarded: https://github.com/uclouvain/openjpeg/issues/992

Hi,

the following vulnerability was published for openjpeg2.

CVE-2017-14039[0]:
| A heap-based buffer overflow was discovered in the opj_t2_encode_packet
| function in lib/openjp2/t2.c in OpenJPEG 2.2.0. The vulnerability
| causes an out-of-bounds write, which may lead to remote denial of
| service or possibly unspecified other impact.

The issue is covered by [3], so trying to reproduce the issue leads to
an assertion failure up to the version in sid instead.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039
[1] https://github.com/uclouvain/openjpeg/issues/992
[2] 
https://github.com/uclouvain/openjpeg/commit/c535531f03369623b9b833ef41952c62257b507e
[3] 
https://github.com/uclouvain/openjpeg/commit/4241ae6fbbf1de9658764a80944dc8108f2b4154

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#874430: openjpeg2: CVE-2017-14151: heap-based buffer overflow in opj_mqc_flush

2017-09-05 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.2-1.3
Severity: grave
Tags: security upstream patch
Forwarded: https://github.com/uclouvain/openjpeg/issues/982

Hi,

the following vulnerability was published for openjpeg2.

CVE-2017-14151[0]:
| An off-by-one error was discovered in
| opj_tcd_code_block_enc_allocate_data in lib/openjp2/tcd.c in OpenJPEG
| 2.2.0. The vulnerability causes an out-of-bounds write, which may lead
| to remote denial of service (heap-based buffer overflow affecting
| opj_mqc_flush in lib/openjp2/mqc.c and opj_t1_encode_cblk in
| lib/openjp2/t1.c) or possibly remote code execution.

Verifiable with an ASAN build of openjpeg2.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14151
[1] https://github.com/uclouvain/openjpeg/issues/982
[2] 
https://blogs.gentoo.org/ago/2017/08/16/openjpeg-heap-based-buffer-overflow-in-opj_mqc_flush-mqc-c/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#874431: openjpeg2: CVE-2017-14152: heap-based buffer overflow in opj_write_bytes_LE

2017-09-05 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.2-1.3
Severity: grave
Tags: upstream patch security
Forwarded: https://github.com/uclouvain/openjpeg/issues/985

Hi,

the following vulnerability was published for openjpeg2.

CVE-2017-14152[0]:
| A mishandled zero case was discovered in opj_j2k_set_cinema_parameters
| in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an
| out-of-bounds write, which may lead to remote denial of service
| (heap-based buffer overflow affecting opj_write_bytes_LE in
| lib/openjp2/cio.c and opj_j2k_write_sot in lib/openjp2/j2k.c) or
| possibly remote code execution.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152
[1] https://github.com/uclouvain/openjpeg/issues/985

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#874431: openjpeg2: CVE-2017-14152: heap-based buffer overflow in opj_write_bytes_LE

2017-09-06 Thread Salvatore Bonaccorso
On Wed, Sep 06, 2017 at 06:58:36AM +0200, Salvatore Bonaccorso wrote:
> Source: openjpeg2
> Version: 2.1.2-1.3
> Severity: grave
> Tags: upstream patch security
> Forwarded: https://github.com/uclouvain/openjpeg/issues/985
> 
> Hi,
> 
> the following vulnerability was published for openjpeg2.
> 
> CVE-2017-14152[0]:
> | A mishandled zero case was discovered in opj_j2k_set_cinema_parameters
> | in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an
> | out-of-bounds write, which may lead to remote denial of service
> | (heap-based buffer overflow affecting opj_write_bytes_LE in
> | lib/openjp2/cio.c and opj_j2k_write_sot in lib/openjp2/j2k.c) or
> | possibly remote code execution.
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2017-14152
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152
> [1] https://github.com/uclouvain/openjpeg/issues/985

When fixing this issue make sure to apply the complete fix to not open
openjpeg2 to CVE-2017-14164. Applying both 

https://github.com/uclouvain/openjpeg/commit/4241ae6fbbf1de9658764a80944dc8108f2b4154

and 

https://github.com/uclouvain/openjpeg/commit/dcac91b8c72f743bda7dbfa9032356bc8110098a

should completely resolve CVE-2017-14152 (double check!).

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#876466: libexif: CVE-2017-7544: Out-of-bounds heap read in exif_data_save_data_entry function

2017-09-22 Thread Salvatore Bonaccorso
Source: libexif
Version: 0.6.21-2
Severity: important
Tags: security patch upstream
Forwarded: https://sourceforge.net/p/libexif/bugs/130/

Hi,

the following vulnerability was published for libexif.

CVE-2017-7544[0]:
| libexif through 0.6.21 is vulnerable to out-of-bounds heap read
| vulnerability in exif_data_save_data_entry function in
| libexif/exif-data.c caused by improper length computation of the
| allocated data of an ExifMnote entry which can cause denial-of-service
| or possibly information disclosure.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-7544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7544
[1] https://sourceforge.net/p/libexif/bugs/130/

The attched report in the upstream bug is password protected, but
there is a produced patch by Marcus Meissner in the upstream bug.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#876535: openjpeg2: Incoorporate lost changelogs (and possibly changes) for NMUs 2.1.2-1.1, 2.1.2-1.2 and 2.1.2-1.3

2017-09-23 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.2.0-1
Severity: normal

Hi Mathieu,

There was an update for openjpeg2 not incoorporating the NMU changelog
for 2.1.2-1.1, 2.1.2-1.2 and 2.1.2-1.3. Please consider incorporating
those again (and double check no change was lost, I guess not that all
should in meanwhile be included in 2.2.0, but for #851422 I'm unsure
if it was fully covered, see the respective upstream issues which only
partially landed in 2.2.0).

Specifically there were some CVEs addressed, which are hopefully still
be fixed in 2.2.0-1, the FTBFS defintively seems so.

cut-cut-cut-cut-cut-cut-
diff -Nru openjpeg2-2.1.2/debian/changelog openjpeg2-2.2.0/debian/changelog
--- openjpeg2-2.1.2/debian/changelog2017-08-12 15:54:38.0 +0200
+++ openjpeg2-2.2.0/debian/changelog2017-09-22 21:51:36.0 +0200
@@ -1,26 +1,13 @@
-openjpeg2 (2.1.2-1.3) unstable; urgency=medium
+openjpeg2 (2.2.0-1) unstable; urgency=medium

-  * Fix FTFBS (Closes: #871905)
+  * New upstream release. Closes: #872041
+  * Fix CVE-2016-9113. Closes: #844552
+  * Fix CVE-2016-9114. Closes: #844553
+  * Fix CVE-2016-9115. Closes: #844554
+  * Fix CVE-2016-9116. Closes: #844555
+  * Fix CVE-2016-9117. Closes: #844556

- -- Moritz Muehlenhoff   Sat, 12 Aug 2017 15:54:38 +0200
-
-openjpeg2 (2.1.2-1.2) unstable; urgency=medium
-
-  * Non-maintainer upload
-  * Fix CVE-2016-1626, CVE-2016-1628, CVE-2016-5152, CVE-2016-9112 and
-CVE-2016-9118.patch
-
- -- Moritz Muehlenhoff   Fri, 11 Aug 2017 22:17:07 +0200
-
-openjpeg2 (2.1.2-1.1) unstable; urgency=medium
-
-  * Non-maintainer upload.
-  * Add CVE-2016-9572_CVE-2016-9573.patch patch.
-CVE-2016-9572: NULL pointer dereference in input decoding
-CVE-2016-9573: Heap out-of-bounds read due to insufficient check in
-imagetopnm(). (Closes: #851422)
-
- -- Salvatore Bonaccorso   Sun, 22 Jan 2017 14:18:13 +0100
+ -- Mathieu Malaterre   Fri, 22 Sep 2017 21:51:36 +0200

 openjpeg2 (2.1.2-1) unstable; urgency=medium
cut-cut-cut-cut-cut-cut-

Thanks for your time, double-checking and working on openjpeg2!

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#876535: openjpeg2: Incoorporate lost changelogs (and possibly changes) for NMUs 2.1.2-1.1, 2.1.2-1.2 and 2.1.2-1.3

2017-09-25 Thread Salvatore Bonaccorso
Hi Mathieu,

On Mon, Sep 25, 2017 at 10:12:31AM +0200, Mathieu Malaterre wrote:
> Control: tags -1 pending
> 
> Hi Salvatore,
> 
> On Sat, Sep 23, 2017 at 1:59 PM, Salvatore Bonaccorso  
> wrote:
> > Source: openjpeg2
> > Version: 2.2.0-1
> > Severity: normal
> >
> > Hi Mathieu,
> >
> > There was an update for openjpeg2 not incoorporating the NMU changelog
> > for 2.1.2-1.1, 2.1.2-1.2 and 2.1.2-1.3. Please consider incorporating
> > those again (and double check no change was lost, I guess not that all
> > should in meanwhile be included in 2.2.0, but for #851422 I'm unsure
> > if it was fully covered, see the respective upstream issues which only
> > partially landed in 2.2.0).
> >
> > Specifically there were some CVEs addressed, which are hopefully still
> > be fixed in 2.2.0-1, the FTBFS defintively seems so.
> >
> > cut-cut-cut-cut-cut-cut-
> > diff -Nru openjpeg2-2.1.2/debian/changelog openjpeg2-2.2.0/debian/changelog
> > --- openjpeg2-2.1.2/debian/changelog2017-08-12 15:54:38.0 +0200
> > +++ openjpeg2-2.2.0/debian/changelog2017-09-22 21:51:36.0 +0200
> > @@ -1,26 +1,13 @@
> > -openjpeg2 (2.1.2-1.3) unstable; urgency=medium
> > +openjpeg2 (2.2.0-1) unstable; urgency=medium
> >
> > -  * Fix FTFBS (Closes: #871905)
> > +  * New upstream release. Closes: #872041
> > +  * Fix CVE-2016-9113. Closes: #844552
> > +  * Fix CVE-2016-9114. Closes: #844553
> > +  * Fix CVE-2016-9115. Closes: #844554
> > +  * Fix CVE-2016-9116. Closes: #844555
> > +  * Fix CVE-2016-9117. Closes: #844556
> >
> > - -- Moritz Muehlenhoff   Sat, 12 Aug 2017 15:54:38 +0200
> > -
> > -openjpeg2 (2.1.2-1.2) unstable; urgency=medium
> > -
> > -  * Non-maintainer upload
> > -  * Fix CVE-2016-1626, CVE-2016-1628, CVE-2016-5152, CVE-2016-9112 and
> > -CVE-2016-9118.patch
> > -
> > - -- Moritz Muehlenhoff   Fri, 11 Aug 2017 22:17:07 +0200
> > -
> > -openjpeg2 (2.1.2-1.1) unstable; urgency=medium
> > -
> > -  * Non-maintainer upload.
> > -  * Add CVE-2016-9572_CVE-2016-9573.patch patch.
> > -CVE-2016-9572: NULL pointer dereference in input decoding
> > -CVE-2016-9573: Heap out-of-bounds read due to insufficient check in
> > -imagetopnm(). (Closes: #851422)
> > -
> > - -- Salvatore Bonaccorso   Sun, 22 Jan 2017 14:18:13 
> > +0100
> > + -- Mathieu Malaterre   Fri, 22 Sep 2017 21:51:36 +0200
> >
> >  openjpeg2 (2.1.2-1) unstable; urgency=medium
> > cut-cut-cut-cut-cut-cut-
> >
> > Thanks for your time, double-checking and working on openjpeg2!
> 
> Wow ! That was bad :( Thanks for catching my mistake.

Thanks a lot for looking that quickly into this!

And thanks for reopening the bugs regarding the 2.2.0-1 stanza, which
are still under investigation/not yet fixed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#877352: openexr:CVE-2017-12596

2017-09-30 Thread Salvatore Bonaccorso
Source: openexr
Version: 2.2.0-11.1
Severity: important
Tags: upstream security
Forwarded: https://github.com/openexr/openexr/issues/238

Hi,

the following vulnerability was published for openexr, filling this
bug to track the upstream issue at [1].

CVE-2017-12596[0]:
| In OpenEXR 2.2.0, a crafted image causes a heap-based buffer over-read
| in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled
| execution; it may result in denial of service or possibly unspecified
| other impact.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-12596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12596
[1] https://github.com/openexr/openexr/issues/238

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#878551: openexr: CVE-2017-14988

2017-10-14 Thread Salvatore Bonaccorso
Source: openexr
Version: 2.2.0-11
Severity: important
Tags: security upstream
Forwarded: https://github.com/openexr/openexr/issues/248

Hi,

the following vulnerability was published for openexr.

CVE-2017-14988[0]:
| Header::readfrom in IlmImf/ImfHeader.cpp in OpenEXR 2.2.0 allows remote
| attackers to cause a denial of service (excessive memory allocation)
| via a crafted file that is accessed with the ImfOpenInputFile function
| in IlmImf/ImfCRgbaFile.cpp.

At the time of writing this bug report there is no upstream fix yet.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14988
[1] https://github.com/openexr/openexr/issues/248

Please adjust the affected versions in the BTS as needed, only 2.2.0
has been checked so far.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#874118: CVE-2017-14039: Heap-based buffer overflow in opj_t2_encode_packet function in lib/openjp2/t2.c

2017-10-16 Thread Salvatore Bonaccorso
Hello Mathieu,

On Mon, Oct 16, 2017 at 06:12:30PM +0200, Mathieu Malaterre wrote:
> Control: severity -1 important
> 
> While I understand the this generic heap based buffer overflow ought
> to be fixed in Debian stable, I fail to see why it is marked as
> affecting stretch.
[...]


In my initial report I wrote: "The issue is covered by [3], so trying
to reproduce the issue leads to an assertion failure up to the version
in sid instead."

My point was, yes if you try to reproduce with current version you
will reach the assertion, because it's yet covered by the missing
commit 4241ae6fbbf1de9658764a80944dc8108f2b4154. Applying that as well
shows the underlying issue.

Hope this helps!

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#882032: optipng: CVE-2017-1000229: Integer Overflow Bug while parsing TIFF input file

2017-11-17 Thread Salvatore Bonaccorso
Source: optipng
Version: 0.7.6-1
Severity: important
Tags: security upstream
Forwarded: https://sourceforge.net/p/optipng/bugs/65/

Hi,

the following vulnerability was published for optipng.

CVE-2017-1000229[0]:
| Integer overflow bug in function minitiff_read_info() of optipng 0.7.6
| allows an attacker to remotely execute code or cause denial of
| service.

With the poc.tiff on upstream bug:

==9473== Memcheck, a memory error detector
==9473== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==9473== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info
==9473== Command: optipng poc.tiff
==9473== 
** Processing: poc.tiff
==9473== Invalid write of size 4
==9473==at 0x109C53: read_ulong_values (tiffread.c:131)
==9473==by 0x117504: minitiff_read_info (tiffread.c:358)
==9473==by 0x114B07: pngx_read_tiff (pngxrtif.c:85)
==9473==by 0x11272C: pngx_read_image (pngxread.c:130)
==9473==by 0x10CABF: opng_read_file (optim.c:939)
==9473==by 0x10DE99: opng_optimize_impl (optim.c:1503)
==9473==by 0x10EC28: opng_optimize (optim.c:1853)
==9473==by 0x10A30E: process_files (optipng.c:941)
==9473==by 0x10A30E: main (optipng.c:975)
==9473==  Address 0x4aa56cc is 0 bytes after a block of size 4 alloc'd
==9473==at 0x482E2BC: malloc (vg_replace_malloc.c:299)
==9473==by 0x1174CA: minitiff_read_info (tiffread.c:353)
==9473==by 0x114B07: pngx_read_tiff (pngxrtif.c:85)
==9473==by 0x11272C: pngx_read_image (pngxread.c:130)
==9473==by 0x10CABF: opng_read_file (optim.c:939)
==9473==by 0x10DE99: opng_optimize_impl (optim.c:1503)
==9473==by 0x10EC28: opng_optimize (optim.c:1853)
==9473==by 0x10A30E: process_files (optipng.c:941)
==9473==by 0x10A30E: main (optipng.c:975)
==9473== 
Error: Error reading TIFF file

** Status report
1 file(s) have been processed.
1 error(s) have been encountered.
==9473== 
==9473== HEAP SUMMARY:
==9473== in use at exit: 4 bytes in 1 blocks
==9473==   total heap usage: 5 allocs, 4 frees, 5,600 bytes allocated
==9473== 
==9473== LEAK SUMMARY:
==9473==definitely lost: 4 bytes in 1 blocks
==9473==indirectly lost: 0 bytes in 0 blocks
==9473==  possibly lost: 0 bytes in 0 blocks
==9473==still reachable: 0 bytes in 0 blocks
==9473== suppressed: 0 bytes in 0 blocks
==9473== Rerun with --leak-check=full to see details of leaked memory
==9473== 
==9473== For counts of detected and suppressed errors, rerun with: -v
==9473== ERROR SUMMARY: 262143 errors from 1 contexts (suppressed: 0 from 0)

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-1000229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000229

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#878839: optipng: diff for NMU version 0.7.6-1.1

2017-12-07 Thread Salvatore Bonaccorso
Control: tags 878839 + patch
Control: tags 878839 + pending
Control: tags 882032 + pending

Dear maintainer,

I've prepared an NMU for optipng (versioned as 0.7.6-1.1) and
uploaded it to DELAYED/5. Please feel free to tell me if I
should delay it longer.

Regards,
Salvatore
diff -Nru optipng-0.7.6/debian/changelog optipng-0.7.6/debian/changelog
--- optipng-0.7.6/debian/changelog	2016-04-08 23:13:43.0 +0200
+++ optipng-0.7.6/debian/changelog	2017-12-07 20:43:29.0 +0100
@@ -1,3 +1,13 @@
+optipng (0.7.6-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Prevent integer overflow in minitiff_read_info() (CVE-2017-1000229)
+(Closes: #882032)
+  * gifread: Detect indirect circular dependencies in LZW tables
+(CVE-2017-16938) (Closes: #878839)
+
+ -- Salvatore Bonaccorso   Thu, 07 Dec 2017 20:43:29 +0100
+
 optipng (0.7.6-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru optipng-0.7.6/debian/patches/CVE-2017-1000229 optipng-0.7.6/debian/patches/CVE-2017-1000229
--- optipng-0.7.6/debian/patches/CVE-2017-1000229	1970-01-01 01:00:00.0 +0100
+++ optipng-0.7.6/debian/patches/CVE-2017-1000229	2017-12-07 20:43:29.0 +0100
@@ -0,0 +1,25 @@
+From 77ac8e9fd9b2c1aeec3951e2bb50f7cc2c1e92d2 Mon Sep 17 00:00:00 2001
+From: Sebastian Pipping 
+Date: Sun, 19 Nov 2017 16:04:26 +0100
+Subject: [PATCH] Prevent integer overflow (bug #65, CVE-2017-1000229)
+
+---
+ src/minitiff/tiffread.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/src/minitiff/tiffread.c b/src/minitiff/tiffread.c
+index b4910ec..5f9b376 100644
+--- a/src/minitiff/tiffread.c
 b/src/minitiff/tiffread.c
+@@ -350,6 +350,8 @@ minitiff_read_info(struct minitiff_info *tiff_ptr, FILE *fp)
+ count = tiff_ptr->strip_offsets_count;
+ if (count == 0 || count > tiff_ptr->height)
+ goto err_invalid;
++if (count > (size_t)-1 / sizeof(long))
++goto err_memory;
+ tiff_ptr->strip_offsets = (long *)malloc(count * sizeof(long));
+ if (tiff_ptr->strip_offsets == NULL)
+ goto err_memory;
+-- 
+2.14.2
+
diff -Nru optipng-0.7.6/debian/patches/CVE-2017-16938 optipng-0.7.6/debian/patches/CVE-2017-16938
--- optipng-0.7.6/debian/patches/CVE-2017-16938	1970-01-01 01:00:00.0 +0100
+++ optipng-0.7.6/debian/patches/CVE-2017-16938	2017-12-07 20:43:29.0 +0100
@@ -0,0 +1,23 @@
+From e05fb81a20541833a2d62ce08552b18c0920b9a1 Mon Sep 17 00:00:00 2001
+From: Cosmin Truta 
+Date: Sat, 25 Nov 2017 23:17:46 -0500
+Subject: [PATCH] gifread: Detect indirect circular dependencies in LZW tables
+
+---
+ src/gifread/gifread.c | 4 +++-
+ src/gifread/gifread.h | 2 +-
+ 2 files changed, 4 insertions(+), 2 deletions(-)
+
+diff --git a/src/gifread/gifread.c b/src/gifread/gifread.c
+index 0123456789abcdef..0123456789abcdef 100644
+--- a/src/gifread/gifread.c
 b/src/gifread/gifread.c
+@@ -499,6 +499,8 @@ static int LZWReadByte(int init_flag, int input_code_size, FILE *stream)
+ *sp++ = table[1][code];
+ if (code == table[0][code])
+ GIFError("GIF/LZW error: circular table entry");
++if ((size_t)(sp - stack) >= sizeof(stack) / sizeof(stack[0]))
++GIFError("GIF/LZW error: circular table");
+ code = table[0][code];
+ }
+ 
diff -Nru optipng-0.7.6/debian/patches/series optipng-0.7.6/debian/patches/series
--- optipng-0.7.6/debian/patches/series	2016-04-08 22:43:41.0 +0200
+++ optipng-0.7.6/debian/patches/series	2017-12-07 20:43:29.0 +0100
@@ -1 +1,3 @@
 fix_typo_in_manpage
+CVE-2017-1000229
+CVE-2017-16938
___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel

[Pkg-phototools-devel] Bug#878839: optipng: moved to delayed/0

2017-12-08 Thread Salvatore Bonaccorso
Hi Emmanuel

I perfectly realize it's not conforming to the NMU rules, so if that
made you unhappy I apologies for it. I moved the optipng upload from
delayed/5 to delayed/0 since was planing a security update, and the
point release happening this weekend would imply stretch-version <
sid-version. So opted for moving the upload faster.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#884738: openjpeg2: CVE-2017-17480: stack-based buffer overflow in pgxtovolume function in jp3d/convert.c

2017-12-18 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.1.0-1
Severity: grave
Tags: security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/1044

Hi,

the following vulnerability was published for openjpeg2.

CVE-2017-17480[0]:
| In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the
| pgxtovolume function in jp3d/convert.c. The vulnerability causes an
| out-of-bounds write, which may lead to remote denial of service or
| possibly remote code execution.

Note there is as well the CVE-2017-17479 assignment, for the
jpwl/convert.c part. But AFAICS the Debian packagagins has overall
BUILD_JPWL:BOOL=OFF, so that one can be considered unimportant since
only present as in the source, but not in the resulting binary
packages. Though if upstream fixes the both issues, then fixes could
be applied.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-17480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17480
[1] https://github.com/uclouvain/openjpeg/issues/1044

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#888533: openjpeg2: CVE-2018-5785: integer overflow in opj_j2k_setup_encoder function in openjp2/j2k.c

2018-01-27 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.3.0-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/1057

Hi,

the following vulnerability was published for openjpeg2.

CVE-2018-5785[0]:
| In OpenJPEG 2.3.0, there is an integer overflow caused by an
| out-of-bounds left shift in the opj_j2k_setup_encoder function
| (openjp2/j2k.c). Remote attackers could leverage this vulnerability to
| cause a denial of service via a crafted bmp file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-5785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785
[1] https://github.com/uclouvain/openjpeg/issues/1057
[2] https://bugzilla.redhat.com/show_bug.cgi?id=1537758#c2

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#888532: openjpeg2: CVE-2018-5727: nteger overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c

2018-01-27 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.3.0-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/1053

Hi,

the following vulnerability was published for openjpeg2.

CVE-2018-5727[0]:
| In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the
| opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could
| leverage this vulnerability to cause a denial of service via a crafted
| bmp file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-5727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727
[1] https://github.com/uclouvain/openjpeg/issues/1053
[2] https://bugzilla.redhat.com/show_bug.cgi?id=1536552#c2

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel


[Pkg-phototools-devel] Bug#889683: openjpeg2: CVE-2018-6616: Excessive Iteration in opj_t1_encode_cblks

2018-02-05 Thread Salvatore Bonaccorso
Source: openjpeg2
Version: 2.3.0-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/1059

Hi,

the following vulnerability was published for openjpeg2.

CVE-2018-6616[0]:
| In OpenJPEG 2.3.0, there is excessive iteration in the
| opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could
| leverage this vulnerability to cause a denial of service via a crafted
| bmp file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-6616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616
[1] https://github.com/uclouvain/openjpeg/issues/1059

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

___
Pkg-phototools-devel mailing list
Pkg-phototools-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-phototools-devel