[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#988995: marked as done (unblock: openexr/2.5.4-2)



Your message dated Sun, 23 May 2021 21:31:18 +0200
with message-id <ebbe3771-93d8-608d-dc47-b811644d5090@debian.org>
and subject line Re: Bug#988995: unblock: openexr/2.5.4-2
has caused the Debian Bug report #988995,
regarding unblock: openexr/2.5.4-2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
988995: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988995
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock

Please unblock package openexr

This new revision aims to fix the CVE-2021-23169, regarding the
Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer.

[ Reason ]
Framebuffer didn't handle images with nonzero dataWindow.min.x!=0 and
xSampling!=1, as well as in exrcheck's stream object, calling seekg()
with a bad value would still seek to a bad position, even though it
threw an exception, so a future read would segfault

[ Impact ]
The fix should handle xsampling and bad seekg() calls in exrcheck,
that in previous Debian revision weren't managed yet.

[ Tests ]
Tests were made upstream, back in December 2020.

[ Risks ]
Very low risk for regressions.

[ Checklist ]
  [x] all changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in testing

unblock openexr/2.5.4-2

-- 
Matteo F. Vescovi || Debian Developer
GnuPG KeyID: 4096R/0x8062398983B2CF7A

diff -Nru openexr-2.5.4/debian/changelog openexr-2.5.4/debian/changelog
--- openexr-2.5.4/debian/changelog	2021-01-21 23:24:00.000000000 +0100
+++ openexr-2.5.4/debian/changelog	2021-05-18 23:26:12.000000000 +0200
@@ -1,3 +1,14 @@
+openexr (2.5.4-2) unstable; urgency=high
+
+  * debian/patches/: patchset updated
+    - CVE-2021-23169.diff added (Closes: #988240)
+    | This patch aims to fix CVE-2021-23169:
+    |   Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer
+    | The patch applied is a reduced version of the upstream
+    | commit, given the code base has changed in the meanwhile.
+
+ -- Matteo F. Vescovi <mfv@debian.org>  Tue, 18 May 2021 23:26:12 +0200
+
 openexr (2.5.4-1) unstable; urgency=medium
 
   * New upstream release
diff -Nru openexr-2.5.4/debian/patches/CVE-2021-23169.diff openexr-2.5.4/debian/patches/CVE-2021-23169.diff
--- openexr-2.5.4/debian/patches/CVE-2021-23169.diff	1970-01-01 01:00:00.000000000 +0100
+++ openexr-2.5.4/debian/patches/CVE-2021-23169.diff	2021-05-18 23:21:27.000000000 +0200
@@ -0,0 +1,19 @@
+Author: peterhillman <peterh@wetafx.co.nz>
+Date:   Thu Dec 3 10:53:32 2020 +1300
+Subject: Handle xsampling and bad seekg() calls in exrcheck
+Origin: https://github.com/AcademySoftwareFoundation/openexr/pull/872
+Bug-Debian: https://bugs.debian.org/988240
+
+diff --git a/OpenEXR/IlmImf/ImfDeepTiledInputFile.cpp b/OpenEXR/IlmImf/ImfDeepTiledInputFile.cpp
+index f5abe9c6..94452905 100644
+--- a/OpenEXR/IlmImf/ImfDeepTiledInputFile.cpp
++++ b/OpenEXR/IlmImf/ImfDeepTiledInputFile.cpp
+@@ -960,7 +960,7 @@ DeepTiledInputFile::compatibilityInitialize(OPENEXR_IMF_INTERNAL_NAMESPACE::IStr
+ void
+ DeepTiledInputFile::multiPartInitialize(InputPartData* part)
+ {
+-    if (isTiled(part->header.type()) == false)
++    if (part->header.type() != DEEPTILE)
+         THROW (IEX_NAMESPACE::ArgExc, "Can't build a DeepTiledInputFile from a part of type " << part->header.type());
+
+     _data->_streamData = part->mutex;
diff -Nru openexr-2.5.4/debian/patches/series openexr-2.5.4/debian/patches/series
--- openexr-2.5.4/debian/patches/series	2020-05-10 23:13:25.000000000 +0200
+++ openexr-2.5.4/debian/patches/series	2021-05-18 23:03:57.000000000 +0200
@@ -11,3 +11,4 @@
 #CVE-2017-911x.patch
 am_foreign_set_global.diff
 bug909865.patch
+CVE-2021-23169.diff

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Hi

On 22-05-2021 20:09, Matteo F. Vescovi wrote:
> Please unblock package openexr

Already unblocked and aged.

Paul

Attachment: OpenPGP_signature
Description: OpenPGP digital signature


--- End Message ---

Reply to: