[Git][security-tracker-team/security-tracker][master] freeimage/jessie: postpone CVE-2019-1221{4, 2}

Hugo Lefeuvre hle at debian.org
Mon Dec 16 12:49:10 GMT 2019



Hugo Lefeuvre pushed to branch master at Debian Security Tracker / security-tracker


Commits:
3020fa4d by Hugo Lefeuvre at 2019-12-16T12:45:30Z
freeimage/jessie: postpone CVE-2019-1221{4, 2}

CVE-2019-12214: without any more information, fixing or even
reproducing this is going to require an insane amount of work.

CVE-2019-12212: this is a crasher, at most. We can wait for upstream
fixes.

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -29225,7 +29225,11 @@ CVE-2019-12214 (In FreeImage 3.18.0, an out-of-bounds access occurs because of m
 	- freeimage <unfixed> (bug #929597)
 	[buster] - freeimage <postponed> (Revisit when upstream fixes are available)
 	[stretch] - freeimage <postponed> (Revisit when upstream fixes are available)
+	[jessie] - freeimage <postponed> (Revisit when upstream fixes are available)
 	NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/e06734bed5/
+	NOTE: very few information regarding this vulnerability, which is seemingly located
+	NOTE: in libopenjpeg, not freeimage. Without reproducer or stacktrace, this is
+	NOTE: nearly unfixable.
 CVE-2019-12213 (When FreeImage 3.18.0 reads a special TIFF file, the TIFFReadDirectory ...)
 	{DLA-2031-1}
 	- freeimage <unfixed> (bug #929597)
@@ -29237,6 +29241,7 @@ CVE-2019-12212 (When FreeImage 3.18.0 reads a special JXR file, the StreamCalcIF
 	- freeimage <unfixed> (bug #929597)
 	[buster] - freeimage <postponed> (Revisit when upstream fixes are available)
 	[stretch] - freeimage <postponed> (Revisit when upstream fixes are available)
+	[jessie] - freeimage <postponed> (Revisit when upstream fixes are available)
 	NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/e06734bed5/
 CVE-2019-12211 (When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load ...)
 	{DLA-2031-1}


=====================================
data/dla-needed.txt
=====================================
@@ -16,14 +16,10 @@ ansible
   NOTE: CVE-2019-14858's upstream patch is too big; fails to work properly. (utkarsh2102)
 --
 clamav (Hugo Lefeuvre)
-  NOTE: waiting for 0.102.1 to enter stretch/buster.
+  NOTE: 20191216: waiting for 0.102.1 to enter stretch/buster.
 --
 cups (Thorsten Alteholz)
 --
-freeimage (Hugo Lefeuvre)
-  NOTE: 20191210: already released DLA-2031-1, still working on CVE-2019-12214 and CVE-2019-12212.
-  NOTE: CVE-2019-12214: fuzzed with an ancient version of openjpeg, needs more investigation
---
 git (Roberto C. Sánchez)
 --
 ibus



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/3020fa4d8e85ab7ba7ca2fd670ccd4e223c90b9f

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/3020fa4d8e85ab7ba7ca2fd670ccd4e223c90b9f
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20191216/a076d430/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list