ALT-BU-2017-3310-1
Branch sisyphus update bulletin.
Package libopenjpeg2.0 updated to version 2.2.0-alt1 for branch sisyphus in task 187264.
Closed vulnerabilities
BDU:2021-01315
Уязвимость библиотеки для кодирования и декодирования изображений OpenJPEG, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-10504
Heap-based buffer overflow vulnerability in the opj_mqc_byteout function in mqc.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (application crash) via a crafted bmp file.
- DSA-4013
- DSA-4013
- 100564
- 100564
- https://github.com/uclouvain/openjpeg/commit/397f62c0a838e15d667ef50e27d5d011d2c79c04
- https://github.com/uclouvain/openjpeg/commit/397f62c0a838e15d667ef50e27d5d011d2c79c04
- https://github.com/uclouvain/openjpeg/issues/835
- https://github.com/uclouvain/openjpeg/issues/835
- GLSA-201710-26
- GLSA-201710-26
- 42600
- 42600
Modified: 2024-11-21
CVE-2016-10505
NULL pointer dereference vulnerabilities in the imagetopnm function in convert.c, sycc444_to_rgb function in color.c, color_esycc_to_rgb function in color.c, and sycc422_to_rgb function in color.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.
- https://github.com/uclouvain/openjpeg/issues/776
- https://github.com/uclouvain/openjpeg/issues/776
- https://github.com/uclouvain/openjpeg/issues/784
- https://github.com/uclouvain/openjpeg/issues/784
- https://github.com/uclouvain/openjpeg/issues/785
- https://github.com/uclouvain/openjpeg/issues/785
- https://github.com/uclouvain/openjpeg/issues/792
- https://github.com/uclouvain/openjpeg/issues/792
- GLSA-201710-26
- GLSA-201710-26
Modified: 2024-11-21
CVE-2016-10506
Division-by-zero vulnerabilities in the functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.
- 100573
- 100573
- https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
- https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
- https://github.com/uclouvain/openjpeg/issues/731
- https://github.com/uclouvain/openjpeg/issues/731
- https://github.com/uclouvain/openjpeg/issues/732
- https://github.com/uclouvain/openjpeg/issues/732
- https://github.com/uclouvain/openjpeg/issues/777
- https://github.com/uclouvain/openjpeg/issues/777
- https://github.com/uclouvain/openjpeg/issues/778
- https://github.com/uclouvain/openjpeg/issues/778
- https://github.com/uclouvain/openjpeg/issues/779
- https://github.com/uclouvain/openjpeg/issues/779
- https://github.com/uclouvain/openjpeg/issues/780
- https://github.com/uclouvain/openjpeg/issues/780
- GLSA-201710-26
- GLSA-201710-26
Modified: 2024-11-21
CVE-2016-10507
Integer overflow vulnerability in the bmp24toimage function in convertbmp.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted bmp file.
- 100567
- 100567
- https://github.com/uclouvain/openjpeg/commit/da940424816e11d624362ce080bc026adffa26e8
- https://github.com/uclouvain/openjpeg/commit/da940424816e11d624362ce080bc026adffa26e8
- https://github.com/uclouvain/openjpeg/issues/833
- https://github.com/uclouvain/openjpeg/issues/833
- GLSA-201710-26
- GLSA-201710-26
Modified: 2024-11-21
CVE-2016-7163
Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write.
- RHSA-2017:0559
- RHSA-2017:0559
- RHSA-2017:0838
- RHSA-2017:0838
- DSA-3665
- DSA-3665
- [oss-security] 20160908 CVE Request: OpenJPEG Integer Overflow Issue
- [oss-security] 20160908 CVE Request: OpenJPEG Integer Overflow Issue
- [oss-security] 20160908 Re: CVE Request: OpenJPEG Integer Overflow Issue
- [oss-security] 20160908 Re: CVE Request: OpenJPEG Integer Overflow Issue
- 92897
- 92897
- https://github.com/uclouvain/openjpeg/commit/c16bc057ba3f125051c9966cf1f5b68a05681de4
- https://github.com/uclouvain/openjpeg/commit/c16bc057ba3f125051c9966cf1f5b68a05681de4
- https://github.com/uclouvain/openjpeg/commit/ef01f18dfc6780b776d0674ed3e7415c6ef54d24
- https://github.com/uclouvain/openjpeg/commit/ef01f18dfc6780b776d0674ed3e7415c6ef54d24
- https://github.com/uclouvain/openjpeg/issues/826
- https://github.com/uclouvain/openjpeg/issues/826
- https://github.com/uclouvain/openjpeg/pull/809
- https://github.com/uclouvain/openjpeg/pull/809
- FEDORA-2016-8ed6b7bb5e
- FEDORA-2016-8ed6b7bb5e
- FEDORA-2016-dc53ceffc2
- FEDORA-2016-dc53ceffc2
- FEDORA-2016-231f53426b
- FEDORA-2016-231f53426b
- FEDORA-2016-2eac99579c
- FEDORA-2016-2eac99579c
- FEDORA-2016-adb346980c
- FEDORA-2016-adb346980c
- FEDORA-2016-27d3b7742f
- FEDORA-2016-27d3b7742f
Modified: 2024-11-21
CVE-2016-9112
Floating Point Exception (aka FPE or divide by zero) in opj_pi_next_cprl function in openjp2/pi.c:523 in OpenJPEG 2.1.2.
- 93978
- 93978
- https://github.com/uclouvain/openjpeg/issues/855
- https://github.com/uclouvain/openjpeg/issues/855
- [debian-lts-announce] 20190710 [SECURITY] [DLA 1851-1] openjpeg2 security update
- [debian-lts-announce] 20190710 [SECURITY] [DLA 1851-1] openjpeg2 security update
- GLSA-201710-26
- GLSA-201710-26
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Modified: 2024-11-21
CVE-2016-9113
There is a NULL pointer dereference in function imagetobmp of convertbmp.c:980 of OpenJPEG 2.1.2. image->comps[0].data is not assigned a value after initialization(NULL). Impact is Denial of Service.
Modified: 2024-11-21
CVE-2016-9114
There is a NULL Pointer Access in function imagetopnm of convert.c:1943(jp2) of OpenJPEG 2.1.2. image->comps[compno].data is not assigned a value after initialization(NULL). Impact is Denial of Service.
Modified: 2024-11-21
CVE-2016-9115
Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
Modified: 2024-11-21
CVE-2016-9116
NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
Modified: 2024-11-21
CVE-2016-9117
NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
Modified: 2024-11-21
CVE-2016-9118
Heap Buffer Overflow (WRITE of size 4) in function pnmtoimage of convert.c:1719 in OpenJPEG 2.1.2.
Modified: 2024-11-21
CVE-2016-9572
A NULL pointer dereference flaw was found in the way openjpeg 2.1.2 decoded certain input images. Due to a logic error in the code responsible for decoding the input image, an application using openjpeg to process image data could crash when processing a crafted image.
- 109233
- 109233
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9572
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9572
- https://github.com/szukw000/openjpeg/commit/7b28bd2b723df6be09fe7791eba33147c1c47d0d
- https://github.com/szukw000/openjpeg/commit/7b28bd2b723df6be09fe7791eba33147c1c47d0d
- https://github.com/uclouvain/openjpeg/issues/863
- https://github.com/uclouvain/openjpeg/issues/863
- GLSA-201710-26
- GLSA-201710-26
- DSA-3768
- DSA-3768
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Modified: 2024-11-21
CVE-2016-9573
An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap.
- RHSA-2017:0838
- RHSA-2017:0838
- 97073
- 97073
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9573
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9573
- https://github.com/szukw000/openjpeg/commit/7b28bd2b723df6be09fe7791eba33147c1c47d0d
- https://github.com/szukw000/openjpeg/commit/7b28bd2b723df6be09fe7791eba33147c1c47d0d
- https://github.com/uclouvain/openjpeg/issues/862
- https://github.com/uclouvain/openjpeg/issues/862
- GLSA-201710-26
- GLSA-201710-26
- DSA-3768
- DSA-3768
Modified: 2024-11-21
CVE-2016-9580
An integer overflow vulnerability was found in tiftoimage function in openjpeg 2.1.2, resulting in heap buffer overflow.
- 94822
- 94822
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
- https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
- https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
- https://github.com/uclouvain/openjpeg/issues/871
- https://github.com/uclouvain/openjpeg/issues/871
- GLSA-201710-26
- GLSA-201710-26
Modified: 2024-11-21
CVE-2016-9581
An infinite loop vulnerability in tiftoimage that results in heap buffer overflow in convert_32s_C1P1 was found in openjpeg 2.1.2.
- 94822
- 94822
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
- https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
- https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
- https://github.com/uclouvain/openjpeg/issues/872
- https://github.com/uclouvain/openjpeg/issues/872
- GLSA-201710-26
- GLSA-201710-26
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-12067
Potrace 1.14 has a heap-based buffer over-read in the interpolate_cubic function in mkbitmap.c.
Modified: 2024-11-21
CVE-2017-7263
The bm_readbody_bmp function in bitmap_io.c in Potrace 1.14 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted BMP image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8698.