Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 602180 (CVE-2016-1626, CVE-2016-1628, CVE-2016-9112) - <media-libs/openjpeg-2.2.0: Multiple vulnerabilities
Summary: <media-libs/openjpeg-2.2.0: Multiple vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2016-1626, CVE-2016-1628, CVE-2016-9112
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B2 [glsa cve]
Keywords: STABLEREQ
Depends on:
Blocks: CVE-2016-9572, CVE-2016-9573 CVE-2016-10504, CVE-2016-10505, CVE-2016-10506, CVE-2016-10507
  Show dependency tree
 
Reported: 2016-12-09 18:03 UTC by Thomas Deutschmann
Modified: 2017-12-20 21:56 UTC (History)
1 user (show)

See Also:
Package list:
=media-libs/openjpeg-2.2.0
Runtime testing required: ---
stable-bot: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Deutschmann gentoo-dev Security 2016-12-09 18:03:44 UTC
> https://github.com/uclouvain/openjpeg/issues/871

CVE-2016-9580 integer overflow in tiftoimage resulting into heap buffer
overflow

> https://github.com/uclouvain/openjpeg/issues/872

CVE-2016-9581 infinite loop in tiftoimage resulting into heap buffer
overflow in convert_32s_C1P1


Proposed fix: https://github.com/uclouvain/openjpeg/pull/873

Report source: http://www.openwall.com/lists/oss-security/2016/12/09/4
Comment 1 Thomas Deutschmann gentoo-dev Security 2017-01-20 16:03:05 UTC
Upstream patch:

https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
Comment 2 Thomas Deutschmann gentoo-dev Security 2017-01-20 16:11:11 UTC
CVE-2016-9112: FPE(Floating Point Exception) in lib/openjp2/pi.c:523

https://github.com/uclouvain/openjpeg/issues/855


CVE-2016-9113: NULL pointer dereference in function imagetobmp

https://github.com/uclouvain/openjpeg/issues/856


CVE-2016-9114: NULL pointer access in function imagetopnm

https://github.com/uclouvain/openjpeg/issues/857


CVE-2016-9115: Heap-buffer overflow in function imagetotga

https://github.com/uclouvain/openjpeg/issues/858


CVE-2016-9116: NULL pointer access in function imagetopnm

https://github.com/uclouvain/openjpeg/issues/859


CVE-2016-9117: NULL pointer access in function imagetopnm

https://github.com/uclouvain/openjpeg/issues/860


CVE-2016-9118: Heap-buffer overflow in function pnmtoimage

https://github.com/uclouvain/openjpeg/issues/861
Comment 4 Thomas Deutschmann gentoo-dev Security 2017-08-20 18:50:11 UTC
Removing "cve" flag, CVE list must be updated.


@ Arches,

please test and mark stable: =media-libs/openjpeg-2.2.0
Comment 5 Thomas Deutschmann gentoo-dev Security 2017-08-20 19:16:51 UTC
x86 stable
Comment 6 Sergei Trofimovich (RETIRED) gentoo-dev 2017-08-20 20:21:12 UTC
ia64 stable
Comment 7 Markus Meier gentoo-dev 2017-08-25 04:44:00 UTC
arm stable
Comment 8 Mikle Kolyada archtester Gentoo Infrastructure gentoo-dev Security 2017-08-25 21:47:15 UTC
amd64 stable
Comment 9 Agostino Sarubbo gentoo-dev 2017-08-28 12:13:38 UTC
FTR 2.2.0 is still affected by some issues. I'd suggest to bump a snapshot or wait for 2.2.1
Comment 10 Matt Turner gentoo-dev 2017-08-31 15:21:26 UTC
alpha stable
Comment 11 Yury German Gentoo Infrastructure gentoo-dev 2017-09-04 01:44:53 UTC
(In reply to Agostino Sarubbo from comment #9)
> FTR 2.2.0 is still affected by some issues. I'd suggest to bump a snapshot
> or wait for 2.2.1

Ago can you please describe the issues. If there is a fix for it lets bump it.
Comment 13 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2017-09-24 21:01:24 UTC
@arches, ping.
Comment 14 Sergei Trofimovich (RETIRED) gentoo-dev 2017-09-25 08:12:43 UTC
hppa/ppc/ppc64 stable
Comment 15 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2017-10-20 02:24:19 UTC
@maintainer(s), please let us know if this can be cleaned or the proper masks applied.  Thanks!
Comment 16 GLSAMaker/CVETool Bot gentoo-dev 2017-10-23 01:39:47 UTC
This issue was resolved and addressed in
 GLSA 201710-26 at https://security.gentoo.org/glsa/201710-26
by GLSA coordinator Aaron Bauman (b-man).