--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock
Hi Release Team
Please unblock package jasper
The jasper upload to unstable fixes CVE-2014-9029, also reported as
#772036, addressing heap-based buffer overflows in libjasper. We have
released DSA-3089-1, the same patch applied for unstable:
jasper (1.900.1-debian1-2.2) unstable; urgency=high
* Non-maintainer upload.
* Add 04-CVE-2014-9029.patch patch.
CVE-2014-9029: incorrect component number check in COC, RGN and QCC
marker segment decoders. (Closes: #772036)
-- Salvatore Bonaccorso <carnil@debian.org> Fri, 05 Dec 2014 08:39:16 +0100
Attached is also the full debdiff against the version in testing.
Could you please unblock jasper to have the fix included in jessie?
unblock jasper/1.900.1-debian1-2.2
Regards,
Salvatore
diff -Nru jasper-1.900.1-debian1/debian/changelog jasper-1.900.1-debian1/debian/changelog
--- jasper-1.900.1-debian1/debian/changelog 2014-09-30 15:54:59.000000000 +0200
+++ jasper-1.900.1-debian1/debian/changelog 2014-12-05 08:59:32.000000000 +0100
@@ -1,3 +1,12 @@
+jasper (1.900.1-debian1-2.2) unstable; urgency=high
+
+ * Non-maintainer upload.
+ * Add 04-CVE-2014-9029.patch patch.
+ CVE-2014-9029: incorrect component number check in COC, RGN and QCC
+ marker segment decoders. (Closes: #772036)
+
+ -- Salvatore Bonaccorso <carnil@debian.org> Fri, 05 Dec 2014 08:39:16 +0100
+
jasper (1.900.1-debian1-2.1) unstable; urgency=medium
* Non-maintainer upload (acked by maintainer)
diff -Nru jasper-1.900.1-debian1/debian/patches/04-CVE-2014-9029.patch jasper-1.900.1-debian1/debian/patches/04-CVE-2014-9029.patch
--- jasper-1.900.1-debian1/debian/patches/04-CVE-2014-9029.patch 1970-01-01 01:00:00.000000000 +0100
+++ jasper-1.900.1-debian1/debian/patches/04-CVE-2014-9029.patch 2014-12-05 08:59:32.000000000 +0100
@@ -0,0 +1,38 @@
+Description: CVE-2014-9029: Heap overflows in libjasper
+Origin: vendor, https://bugzilla.redhat.com/attachment.cgi?id=961994&action=diff
+Bug-Debian: https://bugs.debian.org/772036
+Bug-RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=1167537
+Forwarded: no
+Author: Tomas Hoger <thoger@redhat.com>
+Reviewed-by: Salvatore Bonaccorso <carnil@debian.org>
+Last-Update: 2014-11-28
+
+--- a/src/libjasper/jpc/jpc_dec.c
++++ b/src/libjasper/jpc/jpc_dec.c
+@@ -1280,7 +1280,7 @@ static int jpc_dec_process_coc(jpc_dec_t
+ jpc_coc_t *coc = &ms->parms.coc;
+ jpc_dec_tile_t *tile;
+
+- if (JAS_CAST(int, coc->compno) > dec->numcomps) {
++ if (JAS_CAST(int, coc->compno) >= dec->numcomps) {
+ jas_eprintf("invalid component number in COC marker segment\n");
+ return -1;
+ }
+@@ -1306,7 +1306,7 @@ static int jpc_dec_process_rgn(jpc_dec_t
+ jpc_rgn_t *rgn = &ms->parms.rgn;
+ jpc_dec_tile_t *tile;
+
+- if (JAS_CAST(int, rgn->compno) > dec->numcomps) {
++ if (JAS_CAST(int, rgn->compno) >= dec->numcomps) {
+ jas_eprintf("invalid component number in RGN marker segment\n");
+ return -1;
+ }
+@@ -1355,7 +1355,7 @@ static int jpc_dec_process_qcc(jpc_dec_t
+ jpc_qcc_t *qcc = &ms->parms.qcc;
+ jpc_dec_tile_t *tile;
+
+- if (JAS_CAST(int, qcc->compno) > dec->numcomps) {
++ if (JAS_CAST(int, qcc->compno) >= dec->numcomps) {
+ jas_eprintf("invalid component number in QCC marker segment\n");
+ return -1;
+ }
diff -Nru jasper-1.900.1-debian1/debian/patches/series jasper-1.900.1-debian1/debian/patches/series
--- jasper-1.900.1-debian1/debian/patches/series 2014-09-30 15:54:59.000000000 +0200
+++ jasper-1.900.1-debian1/debian/patches/series 2014-12-05 08:59:32.000000000 +0100
@@ -1,3 +1,4 @@
01-misc-fixes.patch
02-fix-filename-buffer-overflow.patch
03-CVE-2011-4516-and-CVE-2011-4517.patch
+04-CVE-2014-9029.patch
--- End Message ---
--- Begin Message ---
On Fri, 2014-12-05 at 19:43 +0100, Salvatore Bonaccorso wrote:
> The jasper upload to unstable fixes CVE-2014-9029, also reported as
> #772036, addressing heap-based buffer overflows in libjasper. We have
> released DSA-3089-1, the same patch applied for unstable:
Unblocked, thanks.
Regards,
Adam
--- End Message ---