Debian Security Advisory
DSA-4405-1 openjpeg2 -- security update
- Date Reported:
- 10 Mar 2019
- Affected Packages:
- openjpeg2
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 884738, Bug 888533, Bug 889683, Bug 904873, Bug 910763.
In Mitre's CVE dictionary: CVE-2017-17480, CVE-2018-5785, CVE-2018-6616, CVE-2018-14423, CVE-2018-18088. - More information:
-
Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, that could be leveraged to cause a denial of service or possibly remote code execution.
- CVE-2017-17480
Write stack buffer overflow in the jp3d and jpwl codecs can result in a denial of service or remote code execution via a crafted jp3d or jpwl file.
- CVE-2018-5785
Integer overflow can result in a denial of service via a crafted bmp file.
- CVE-2018-6616
Excessive iteration can result in a denial of service via a crafted bmp file.
- CVE-2018-14423
Division-by-zero vulnerabilities can result in a denial of service via a crafted j2k file.
- CVE-2018-18088
Null pointer dereference can result in a denial of service via a crafted bmp file.
For the stable distribution (stretch), these problems have been fixed in version 2.1.2-1.1+deb9u3.
We recommend that you upgrade your openjpeg2 packages.
For the detailed security status of openjpeg2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openjpeg2
- CVE-2017-17480