You are here
Home > Preporuke > Sigurnosni nedostaci programske biblioteke mingw openjpeg2

Sigurnosni nedostaci programske biblioteke mingw openjpeg2

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2020-d32853a28d
2021-01-15 01:20:50.315040
——————————————————————————–

Name : mingw-openjpeg2
Product : Fedora 32
Version : 2.3.1
Release : 11.fc32
URL : https://github.com/uclouvain/openjpeg
Summary : MinGW Windows openjpeg2 library
Description :
MinGW Windows openjpeg2 library.

——————————————————————————–
Update Information:

This update backports patches for CVE-2020-27841, CVE-2020-27842,
CVE-2020-27843, CVE-2020-27845. —- This update backports patches for
CVE-2020-27824 and CVE-2020-27823. —- Backport patch for CVE-2020-27814.
——————————————————————————–
ChangeLog:

* Thu Dec 17 2020 Sandro Mani <manisandro@gmail.com> – 2.3.1-11
* Backport patches for CVE-2020-27841, CVE-2020-27842, CVE-2020-27843, CVE-2020-27845
* Thu Dec 10 2020 Sandro Mani <manisandro@gmail.com> – 2.3.1-10
* Backport patches for CVE-2020-27824 and CVE-2020-27823
* Sat Nov 28 2020 Sandro Mani <manisandro@gmail.com> – 2.3.1-9
– Backport patch for CVE-2020-27814
* Tue Jul 28 2020 Fedora Release Engineering <releng@fedoraproject.org> – 2.3.1-8
– Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1902000 – CVE-2020-27814 openjpeg2: openjpeg: Heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1902000
[ 2 ] Bug #1902001 – CVE-2020-27814 mingw-openjpeg2: openjpeg: Heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1902001
[ 3 ] Bug #1905725 – CVE-2020-27824 openjpeg2: openjpeg: global-buffer-overflow read in lib-openjp2 [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1905725
[ 4 ] Bug #1906220 – CVE-2020-27823 openjpeg2: openjpeg: Heap-buffer-overflow write in lib-openjp2 [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1906220
[ 5 ] Bug #1907674 – CVE-2020-27841 openjpeg2: openjpeg: heap-based buffer overflows in lib/openjp2/pi.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907674
[ 6 ] Bug #1907675 – CVE-2020-27841 mingw-openjpeg2: openjpeg: heap-based buffer overflows in lib/openjp2/pi.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907675
[ 7 ] Bug #1907681 – CVE-2020-27842 openjpeg2: openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907681
[ 8 ] Bug #1907682 – CVE-2020-27842 mingw-openjpeg2: openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907682
[ 9 ] Bug #1907686 – CVE-2020-27843 openjpeg2: openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907686
[ 10 ] Bug #1907688 – CVE-2020-27843 mingw-openjpeg2: openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907688
[ 11 ] Bug #1907702 – CVE-2020-27845 openjpeg2: openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907702
[ 12 ] Bug #1907703 – CVE-2020-27845 mingw-openjpeg2: openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1907703
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-d32853a28d’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Autor161.53.13.146
Cert idNCERT-REF-2021-01-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programske biblioteke openjpeg2

Otkriveni su sigurnosni nedostaci programske biblioteke openjpeg2 za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja. Savjetuje...

Close