Feeds

Actualités informatiques

DSA-4405 openjpeg2

Debian Security Advisory

DSA-4405-1 openjpeg2 -- security update

Date Reported:
10 Mar 2019
Affected Packages:
openjpeg2
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 884738, Bug 888533, Bug 889683, Bug 904873, Bug 910763.
In Mitre's CVE dictionary: CVE-2017-17480, CVE-2018-5785, CVE-2018-6616, CVE-2018-14423, CVE-2018-18088.
More information:

Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, that could be leveraged to cause a denial of service or possibly remote code execution.

  • CVE-2017-17480

    Write stack buffer overflow in the jp3d and jpwl codecs can result in a denial of service or remote code execution via a crafted jp3d or jpwl file.

  • CVE-2018-5785

    Integer overflow can result in a denial of service via a crafted bmp file.

  • CVE-2018-6616

    Excessive iteration can result in a denial of service via a crafted bmp file.

  • CVE-2018-14423

    Division-by-zero vulnerabilities can result in a denial of service via a crafted j2k file.

  • CVE-2018-18088

    Null pointer dereference can result in a denial of service via a crafted bmp file.

For the stable distribution (stretch), these problems have been fixed in version 2.1.2-1.1+deb9u3.

We recommend that you upgrade your openjpeg2 packages.

For the detailed security status of openjpeg2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openjpeg2