Change logs for openjpeg2 source package in Hirsute

  • openjpeg2 (2.3.1-1ubuntu5) hirsute; urgency=medium
    
      * SECURITY UPDATE: use-after-free via directory
        - debian/patches/CVE-2020-15389.patch: fix double-free on input
          directory with mix of valid and invalid images in
          src/bin/jp2/opj_decompress.c.
        - CVE-2020-15389
      * SECURITY UPDATE: heap-buffer-overflow
        - debian/patches/CVE-2020-27814-1.patch: grow buffer size in
          src/lib/openjp2/tcd.c.
        - debian/patches/CVE-2020-27814-2.patch: grow it again
        - debian/patches/CVE-2020-27814-3.patch: and some more
        - debian/patches/CVE-2020-27814-4.patch: bigger, BIGGER!!!
        - CVE-2020-27814
      * SECURITY UPDATE: heap-buffer-overflow write
        - debian/patches/CVE-2020-27823.patch: fix wrong computation in
          src/bin/jp2/convertpng.c.
        - CVE-2020-27823
      * SECURITY UPDATE: global-buffer-overflow
        - debian/patches/CVE-2020-27824.patch: avoid global buffer overflow on
          irreversible conversion when too many decomposition levels are
          specified in src/lib/openjp2/dwt.c.
        - CVE-2020-27824
      * SECURITY UPDATE: out-of-bounds read
        - debian/patches/CVE-2020-27841.patch: add extra checks to
          src/lib/openjp2/pi.c, src/lib/openjp2/pi.h, src/lib/openjp2/t2.c.
        - CVE-2020-27841
      * SECURITY UPDATE: null pointer dereference
        - debian/patches/CVE-2020-27842.patch: add check to
          src/lib/openjp2/t2.c.
        - CVE-2020-27842
      * SECURITY UPDATE: out-of-bounds read
        - debian/patches/CVE-2020-27843.patch: add check to
          src/lib/openjp2/t2.c.
        - CVE-2020-27843
      * SECURITY UPDATE: out-of-bounds read
        - debian/patches/CVE-2020-27845.patch: add extra checks to
          src/lib/openjp2/pi.c.
        - CVE-2020-27845
    
     -- Marc Deslauriers <email address hidden>  Wed, 06 Jan 2021 09:44:46 -0500
  • openjpeg2 (2.3.1-1ubuntu4) focal; urgency=medium
    
      * SECURITY UPDATE: denial of service via excessive iteration
        - debian/patches/CVE-2019-12973-1.patch: detect invalid file dimensions
          early in src/bin/jp2/convertbmp.c.
        - debian/patches/CVE-2019-12973-2.patch: avoid potential infinite loop
          in src/bin/jp2/convertbmp.c.
        - CVE-2019-12973
      * SECURITY UPDATE: heap overflow in opj_t1_clbl_decode_processor
        - debian/patches/CVE-2020-6851.patch: reject images whose
          coordinates are beyond INT_MAX in src/lib/openjp2/j2k.c.
        - CVE-2020-6851
      * SECURITY UPDATE: another heap overflow in opj_t1_clbl_decode_processor
        - debian/patches/CVE-2020-8112.patch: avoid integer overflow in
          src/lib/openjp2/tcd.c.
        - CVE-2020-8112
    
     -- Marc Deslauriers <email address hidden>  Wed, 19 Feb 2020 09:52:00 -0500