Package: sam2p
X-Debbugs-CC: t...@security.debian.org 
secure-testing-team@lists.alioth.debian.org
Severity: grave
Tags: security

Hi,

the following vulnerabilities were published for sam2p.

CVE-2017-14637[0]:
| In sam2p 0.49.3, there is an invalid read of size 2 in the parse_rgb
| function in in_xpm.cpp. However, this can also cause a write to an
| illegal address.

CVE-2017-14636[1]:
| Because of an integer overflow in sam2p 0.49.3, a loop executes
| 0xffffffff times, ending with an invalid read of size 1 in the
| Image::Indexed::sortPal function in image.cpp. However, this also
| causes memory corruption because of an attempted write to the invalid
| d[0xfffffffe] array element.

CVE-2017-14628[2]:
| In sam2p 0.49.3, a heap-based buffer overflow exists in the
| pcxLoadImage24 function of the file in_pcx.cpp.

CVE-2017-14629[3]:
| In sam2p 0.49.3, the in_xpm_reader function in in_xpm.cpp has an
| integer signedness error, leading to a crash when writing to an
| out-of-bounds array element.

CVE-2017-14630[4]:
| In sam2p 0.49.3, an integer overflow exists in the pcxLoadImage24
| function of the file in_pcx.cpp, leading to an invalid write operation.

CVE-2017-14631[5]:
| In sam2p 0.49.3, the pcxLoadRaster function in in_pcx.cpp has an
| integer signedness error leading to a heap-based buffer overflow.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14637
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14637
[1] https://security-tracker.debian.org/tracker/CVE-2017-14636
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14636
[2] https://security-tracker.debian.org/tracker/CVE-2017-14628
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14628
[3] https://security-tracker.debian.org/tracker/CVE-2017-14629
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14629
[4] https://security-tracker.debian.org/tracker/CVE-2017-14630
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14630
[5] https://security-tracker.debian.org/tracker/CVE-2017-14631
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14631

Please adjust the affected versions in the BTS as needed.

_______________________________________________
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to