[Git][security-tracker-team/security-tracker][master] CVE-2021-23215/openexr: clarify patches some more

Sylvain Beucler (@beuc) beuc at debian.org
Sat Jul 3 14:53:38 BST 2021



Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker


Commits:
fbe3854d by Sylvain Beucler at 2021-07-03T15:49:33+02:00
CVE-2021-23215/openexr: clarify patches some more
(Following prompt by carnil)

de27156 is a pre-requisite for the 2.x branches (especially our 2.2.x versions).
Without it (especially chunk #4 whose code range is untouched by the other patch) the test suite fails.

$ ./IlmImfTest testCompression
tempDir = /var/tmp/IlmImfTest_ODOFNYZG

=======
Running testCompression
Testing pixel data types, subsampling and compression schemes
only zeroes
compression 0, x sampling 1, y sampling 1: writing reading comparing
compression 1, x sampling 1, y sampling 1: writing reading comparing
compression 2, x sampling 1, y sampling 1: writing reading comparing
compression 3, x sampling 1, y sampling 1: writing reading comparing
compression 4, x sampling 1, y sampling 1: writing readingImfFastHuf.cpp:392:48: runtime error: shift exponent 64 is too large for 64-bit type 'long unsigned int'
 comparing
compression 5, x sampling 1, y sampling 1: writing reading comparing
compression 6, x sampling 1, y sampling 1: writing reading../IlmImf/ImfXdr.h:679:9: runtime error: left shift of negative value -15
 comparing
compression 7, x sampling 1, y sampling 1: writing reading comparing
compression 8, x sampling 1, y sampling 1: writing readingERROR -- caught exception: Error reading pixel data from image file "/var/tmp/IlmImfTest_ODOFNYZG/imf_test_comp.exr". Error uncompressing DWA data(corrupt header).
IlmImfTest: testCompression.cpp:433: void testCompression(const string&): Assertion `false' failed.
Abandon

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -10677,8 +10677,8 @@ CVE-2021-23215 (An integer overflow leading to a heap-buffer overflow was found
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29653
 	NOTE: https://github.com/AcademySoftwareFoundation/openexr/pull/901
 	NOTE: https://github.com/AcademySoftwareFoundation/openexr/commit/0e08c959c5459e2ffd3b81b654c3ce8b71a4b42c (v3.0.0-beta)
-	NOTE: https://github.com/AcademySoftwareFoundation/openexr/commit/de27156b77896aeef5b1c99edbca2bc4fa784b51 (v2.3.0)
 	NOTE: https://github.com/AcademySoftwareFoundation/openexr/commit/4212416433a230334cef0ac122cb8d722746035d (v2.5.5)
+	NOTE: Depends on https://github.com/AcademySoftwareFoundation/openexr/commit/de27156b77896aeef5b1c99edbca2bc4fa784b51 (v2.3.0)
 CVE-2021-23169 (A heap-buffer overflow was found in the copyIntoFrameBuffer function o ...)
 	- openexr 2.5.4-2 (bug #988240)
 	[buster] - openexr <not-affected> (Vulnerable code not present)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fbe3854d4737b1de1924ffd3148eb59b51088c40

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fbe3854d4737b1de1924ffd3148eb59b51088c40
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210703/e51f864a/attachment.htm>


More information about the debian-security-tracker-commits mailing list