Debian Security Advisory
DSA-4405-1 openjpeg2 -- security update
- Date Reported:
- 10 Mar 2019
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 884738, Bug 888533, Bug 889683, Bug 904873, Bug 910763.
In Mitre's CVE dictionary: CVE-2017-17480, CVE-2018-5785, CVE-2018-6616, CVE-2018-14423, CVE-2018-18088.
- More information:
Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, that could be leveraged to cause a denial of service or possibly remote code execution.
Write stack buffer overflow in the jp3d and jpwl codecs can result in a denial of service or remote code execution via a crafted jp3d or jpwl file.
Integer overflow can result in a denial of service via a crafted bmp file.
Excessive iteration can result in a denial of service via a crafted bmp file.
Division-by-zero vulnerabilities can result in a denial of service via a crafted j2k file.
Null pointer dereference can result in a denial of service via a crafted bmp file.
For the stable distribution (stretch), these problems have been fixed in version 2.1.2-1.1+deb9u3.
We recommend that you upgrade your openjpeg2 packages.
For the detailed security status of openjpeg2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openjpeg2