[Git][security-tracker-team/security-tracker][master] CVE-2021-23215/openexr: clarify patches some more
Sylvain Beucler (@beuc)
beuc at debian.org
Sat Jul 3 14:53:38 BST 2021
Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker
Commits:
fbe3854d by Sylvain Beucler at 2021-07-03T15:49:33+02:00
CVE-2021-23215/openexr: clarify patches some more
(Following prompt by carnil)
de27156 is a pre-requisite for the 2.x branches (especially our 2.2.x versions).
Without it (especially chunk #4 whose code range is untouched by the other patch) the test suite fails.
$ ./IlmImfTest testCompression
tempDir = /var/tmp/IlmImfTest_ODOFNYZG
=======
Running testCompression
Testing pixel data types, subsampling and compression schemes
only zeroes
compression 0, x sampling 1, y sampling 1: writing reading comparing
compression 1, x sampling 1, y sampling 1: writing reading comparing
compression 2, x sampling 1, y sampling 1: writing reading comparing
compression 3, x sampling 1, y sampling 1: writing reading comparing
compression 4, x sampling 1, y sampling 1: writing readingImfFastHuf.cpp:392:48: runtime error: shift exponent 64 is too large for 64-bit type 'long unsigned int'
comparing
compression 5, x sampling 1, y sampling 1: writing reading comparing
compression 6, x sampling 1, y sampling 1: writing reading../IlmImf/ImfXdr.h:679:9: runtime error: left shift of negative value -15
comparing
compression 7, x sampling 1, y sampling 1: writing reading comparing
compression 8, x sampling 1, y sampling 1: writing readingERROR -- caught exception: Error reading pixel data from image file "/var/tmp/IlmImfTest_ODOFNYZG/imf_test_comp.exr". Error uncompressing DWA data(corrupt header).
IlmImfTest: testCompression.cpp:433: void testCompression(const string&): Assertion `false' failed.
Abandon
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -10677,8 +10677,8 @@ CVE-2021-23215 (An integer overflow leading to a heap-buffer overflow was found
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29653
NOTE: https://github.com/AcademySoftwareFoundation/openexr/pull/901
NOTE: https://github.com/AcademySoftwareFoundation/openexr/commit/0e08c959c5459e2ffd3b81b654c3ce8b71a4b42c (v3.0.0-beta)
- NOTE: https://github.com/AcademySoftwareFoundation/openexr/commit/de27156b77896aeef5b1c99edbca2bc4fa784b51 (v2.3.0)
NOTE: https://github.com/AcademySoftwareFoundation/openexr/commit/4212416433a230334cef0ac122cb8d722746035d (v2.5.5)
+ NOTE: Depends on https://github.com/AcademySoftwareFoundation/openexr/commit/de27156b77896aeef5b1c99edbca2bc4fa784b51 (v2.3.0)
CVE-2021-23169 (A heap-buffer overflow was found in the copyIntoFrameBuffer function o ...)
- openexr 2.5.4-2 (bug #988240)
[buster] - openexr <not-affected> (Vulnerable code not present)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fbe3854d4737b1de1924ffd3148eb59b51088c40
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fbe3854d4737b1de1924ffd3148eb59b51088c40
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210703/e51f864a/attachment.htm>
More information about the debian-security-tracker-commits
mailing list