Package: openjpeg2 / 2.3.0-2+deb10u2
Metadata
Package | Version | Patches format |
---|---|---|
openjpeg2 | 2.3.0-2+deb10u2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
multiarch_path.patch | (download) |
cmake/OpenJPEGConfig.cmake.in |
2 1 + 1 - 0 ! |
upstream did not handle multi-arch installation path It naively assumed the include location to be two levels above the lib installation. |
java9.patch | (download) |
src/bin/jpip/CMakeLists.txt |
4 2 + 2 - 0 ! |
java9 |
CVE 2017 17480.patch | (download) |
src/bin/jp3d/convert.c |
4 2 + 2 - 0 ! |
jp3d/jpwl convert: fix write stack buffer overflow Missing buffer length formatter in fscanf call might lead to write stack buffer overflow. |
CVE 2018 14423.patch | (download) |
src/lib/openjp3d/pi.c |
24 24 + 0 - 0 ! |
jp3d: avoid divisions by zero / undefined behaviour on shift |
CVE 2018 18088.patch | (download) |
src/bin/jp2/convert.c |
5 5 + 0 - 0 ! |
jp2: convert: fix null pointer dereference Tile components in a JP2 image might have null data pointer by defining a zero component size (for example using large horizontal or vertical sampling periods). This null data pointer leads to null image component data pointer, causing crash when dereferenced without != null check in imagetopnm. . Add != null check. |
CVE 2018 5785.patch | (download) |
src/bin/jp2/convertbmp.c |
21 21 + 0 - 0 ! |
convertbmp: fix issues with zero bitmasks In the case where a BMP file declares compression 3 (BI_BITFIELDS) with header size <= 56, all bitmask values keep their initialization value 0. This may lead to various undefined behavior later e.g. when doing 1 << (l_comp->prec - 1). . This issue does not affect files with bit count 16 because of a check added in 16240e2 which sets default values to the color masks if they are all 0. . This commit adds similar checks for the 32 bit case. . Also, if a BMP file declares compression 3 with header size >= 56 and intentional 0 bitmasks, the same issue will be triggered in both the 16 and 32 bit count case. . This commit adds checks to bmp_read_info_header() rejecting BMP files with "intentional" 0 bitmasks. These checks might be removed in the future when proper handling of zero bitmasks will be available in openjpeg2. |
CVE 2018 6616.patch | (download) |
src/bin/jp2/convertbmp.c |
12 10 + 2 - 0 ! |
convertbmp: detect invalid file dimensions early width/length dimensions read from bmp headers are not necessarily valid. For instance they may have been maliciously set to very large values with the intention to cause DoS (large memory allocation, stack overflow). In these cases we want to detect the invalid size as early as possible. . This commit introduces a counter which verifies that the number of written bytes corresponds to the advertized width/length. |
CVE 2018 21010.patch | (download) |
src/bin/common/color.c |
12 12 + 0 - 0 ! |
color_apply_icc_profile: avoid potential heap buffer overflow |
CVE 2018 20847.patch | (download) |
src/lib/openjp2/pi.c |
17 9 + 8 - 0 ! |
fix integer overflow in opj_get_encoding_parameters This bug is known at three places in the source code: opj_get_all_encoding_parameters() and opj_tcd_init_tile() in pi.c and tcd.c (both fixed _before_ the release of 2.1.2), and opj_get_encoding_parameters() in pi.c. This patch addresses the issue in opj_get_encoding_parameters(). |
CVE 2020 27814.patch | (download) |
src/lib/openjp2/tcd.c |
10 8 + 2 - 0 ! |
[patch] encoder: grow again buffer size in opj_tcd_code_block_enc_allocate_data() (fixes #1283) |
CVE 2020 27823.patch | (download) |
src/bin/jp2/convertpng.c |
4 2 + 2 - 0 ! |
[patch] pngtoimage(): fix wrong computation of x1,y1 if -d option is used, that would result in a heap buffer overflow (fixes #1284) |
CVE 2020 27841.patch | (download) |
src/lib/openjp2/pi.c |
49 32 + 17 - 0 ! |
[patch] pi.c: avoid out of bounds access with poc (refs https://github.com/uclouvain/openjpeg/issues/1293#issuecomment-737122836) |
CVE 2020 27842.patch | (download) |
src/lib/openjp2/t2.c |
9 9 + 0 - 0 ! |
[patch] opj_t2_encode_packet(): avoid out of bound access of #1294, but likely not the proper fix |
CVE 2020 27843.patch | (download) |
src/lib/openjp2/t2.c |
9 9 + 0 - 0 ! |
[patch] opj_t2_encode_packet(): avoid out of bound access of #1297, but likely not the proper fix |
CVE 2020 27845.patch | (download) |
src/lib/openjp2/pi.c |
25 23 + 2 - 0 ! |
[patch] pi.c: avoid out of bounds access with poc (fixes #1302) |
CVE 2020 27824.patch | (download) |
src/lib/openjp2/dwt.c |
2 1 + 1 - 0 ! |
[patch] encoder: avoid global buffer overflow on irreversible conversion when too many decomposition levels are specified (fixes #1286) |
CVE 2020 15389.patch | (download) |
src/bin/jp2/opj_decompress.c |
8 4 + 4 - 0 ! |
[patch] opj_decompress: fix double-free on input directory with mix of valid and invalid images (CVE-2020-15389) |
CVE 2020 8112.patch | (download) |
src/lib/openjp2/tcd.c |
20 18 + 2 - 0 ! |
[patch] opj_tcd_init_tile(): avoid integer overflow That could lead to later assertion failures. Fixes #1231 / CVE-2020-8112 |
CVE 2020 6851.patch | (download) |
src/lib/openjp2/j2k.c |
8 8 + 0 - 0 ! |
--- |