You are here
Home > Preporuke > Sigurnosni nedostaci programskih biblioteka openjpeg2 i mingw openjpeg2

Sigurnosni nedostaci programskih biblioteka openjpeg2 i mingw openjpeg2

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2020-3e00413763
2020-12-22 01:28:31.149478
——————————————————————————–

Name : openjpeg2
Product : Fedora 33
Version : 2.3.1
Release : 10.fc33
URL : https://github.com/uclouvain/openjpeg
Summary : C-Library for JPEG 2000
Description :
The OpenJPEG library is an open-source JPEG 2000 library developed in order to
promote the use of JPEG 2000.

This package contains
* JPEG 2000 codec compliant with the Part 1 of the standard (Class-1 Profile-1
compliance).
* JP2 (JPEG 2000 standard Part 2 – Handling of JP2 boxes and extended multiple
component transforms for multispectral and hyperspectral imagery)

——————————————————————————–
Update Information:

This update backports patches for CVE-2020-27841, CVE-2020-27842,
CVE-2020-27843, CVE-2020-27845.
——————————————————————————–
ChangeLog:

* Thu Dec 17 2020 Sandro Mani <manisandro@gmail.com> – 2.3.1-10
* Backport patches for CVE-2020-27841, CVE-2020-27842, CVE-2020-27843, CVE-2020-27845
——————————————————————————–
References:

[ 1 ] Bug #1907674 – CVE-2020-27841 openjpeg2: openjpeg: heap-based buffer overflows in lib/openjp2/pi.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907674
[ 2 ] Bug #1907675 – CVE-2020-27841 mingw-openjpeg2: openjpeg: heap-based buffer overflows in lib/openjp2/pi.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907675
[ 3 ] Bug #1907681 – CVE-2020-27842 openjpeg2: openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907681
[ 4 ] Bug #1907682 – CVE-2020-27842 mingw-openjpeg2: openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907682
[ 5 ] Bug #1907686 – CVE-2020-27843 openjpeg2: openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907686
[ 6 ] Bug #1907688 – CVE-2020-27843 mingw-openjpeg2: openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907688
[ 7 ] Bug #1907702 – CVE-2020-27845 openjpeg2: openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907702
[ 8 ] Bug #1907703 – CVE-2020-27845 mingw-openjpeg2: openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907703
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-3e00413763’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2020-3e00413763
2020-12-22 01:28:31.149478
——————————————————————————–

Name : mingw-openjpeg2
Product : Fedora 33
Version : 2.3.1
Release : 11.fc33
URL : https://github.com/uclouvain/openjpeg
Summary : MinGW Windows openjpeg2 library
Description :
MinGW Windows openjpeg2 library.

——————————————————————————–
Update Information:

This update backports patches for CVE-2020-27841, CVE-2020-27842,
CVE-2020-27843, CVE-2020-27845.
——————————————————————————–
ChangeLog:

* Thu Dec 17 2020 Sandro Mani <manisandro@gmail.com> – 2.3.1-11
* Backport patches for CVE-2020-27841, CVE-2020-27842, CVE-2020-27843, CVE-2020-27845
——————————————————————————–
References:

[ 1 ] Bug #1907674 – CVE-2020-27841 openjpeg2: openjpeg: heap-based buffer overflows in lib/openjp2/pi.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907674
[ 2 ] Bug #1907675 – CVE-2020-27841 mingw-openjpeg2: openjpeg: heap-based buffer overflows in lib/openjp2/pi.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907675
[ 3 ] Bug #1907681 – CVE-2020-27842 openjpeg2: openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907681
[ 4 ] Bug #1907682 – CVE-2020-27842 mingw-openjpeg2: openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907682
[ 5 ] Bug #1907686 – CVE-2020-27843 openjpeg2: openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907686
[ 6 ] Bug #1907688 – CVE-2020-27843 mingw-openjpeg2: openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907688
[ 7 ] Bug #1907702 – CVE-2020-27845 openjpeg2: openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907702
[ 8 ] Bug #1907703 – CVE-2020-27845 mingw-openjpeg2: openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907703
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-3e00413763’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorDona Šeruga
Cert idNCERT-REF-2020-12-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa Red Hat OpenShift Service Mesh

Otkriveni su sigurnosni nedostaci u programskom paketu Red Hat OpenShift Service Mesh za operacijski sustav RHEL. Otkriveni nedostaci potencijalnim napadačima...

Close