Bug 54659 - openjpeg2: Multiple issues (4.4)
openjpeg2: Multiple issues (4.4)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.4
All Linux
: P3 normal (vote)
: UCS 4.4-8-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-04-11 07:57 CEST by Quality Assurance
Modified: 2022-04-13 15:13 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 6.2 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2022-04-11 07:57:58 CEST
New Debian openjpeg2 2.1.2-1.1+deb9u7 fixes:
This update addresses the following issues:
* null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c  (CVE-2020-27842)
* out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c  (CVE-2020-27843)
* out-of-bounds write due to an integer overflow in opj_compress.c  (CVE-2021-29338)
* segmentation fault in opj2_decompress due to uninitialized pointer  (CVE-2022-1122)
Comment 1 Quality Assurance univentionstaff 2022-04-11 08:01:47 CEST
--- mirror/ftp/4.4/unmaintained/4.4-8/source/openjpeg2_2.1.2-1.1+deb9u6.dsc
+++ apt/ucs_4.4-0-errata4.4-8/source/openjpeg2_2.1.2-1.1+deb9u7.dsc
@@ -1,3 +1,15 @@
+2.1.2-1.1+deb9u7 [Sun, 10 Apr 2022 14:16:30 +0200] Anton Gladky <gladk@debian.org>:
+
+  * Non-maintainer upload by the LTS Security Team.
+  * Fix CVE-2022-1122: input directory with a large number of files
+    can lead to to a segmentation fault and a denial of service.
+  * Fix CVE-2021-29338: integer overflow allows remote attackers to
+    crash the application, causing a Denial of Service.
+  * Fix CVE-2020-27843: out-of-bounds read through specially crafted
+    input to the conversion or encoding functionality.
+  * Fix CVE-2020-27842: null pointer dereference through specially crafted
+    input.
+
 2.1.2-1.1+deb9u6 [Thu, 04 Feb 2021 08:18:38 +1100] Brian May <bam@debian.org>:
 
   * Non-maintainer upload by the LTS Security Team.

<http://piuparts.knut.univention.de/4.4-8/#6512527586344450009>
Comment 2 Philipp Hahn univentionstaff 2022-04-11 08:29:25 CEST
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.4-8] c5ac40eced Bug #54659: openjpeg2 2.1.2-1.1+deb9u7
 doc/errata/staging/openjpeg2.yaml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

[4.4-8] 6c280f42f0 Bug #54659: openjpeg2 2.1.2-1.1+deb9u7
 doc/errata/staging/openjpeg2.yaml | 22 ++++++++++++++++++++++
 1 file changed, 22 insertions(+)