Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in mingw-openjpeg2
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in mingw-openjpeg2
ID: FEDORA-2018-200c84e08a
Distribution: Fedora
Plattformen: Fedora 28
Datum: Sa, 29. Dezember 2018, 10:43
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18088
Applikationen: OpenJPEG

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2018-200c84e08a
2018-12-29 02:24:45.592336
-------------------------------------------------------------------------------
-

Name : mingw-openjpeg2
Product : Fedora 28
Version : 2.3.0
Release : 6.fc28
URL : https://github.com/uclouvain/openjpeg
Summary : MinGW Windows openjpeg2 library
Description :
MinGW Windows openjpeg2 library.

-------------------------------------------------------------------------------
-
Update Information:

This update fixes CVE-2018-18088 and CVE-2018-6616
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Dec 20 2018 Sandro Mani <manisandro@gmail.com> - 2.3.0-6
- Backport patches for CVE-2018-18088, CVE-2018-6616
* Sat Oct 6 2018 Sandro Mani <manisandro@gmail.com> - 2.3.0-4
- Add openjpeg2_opj2.patch from native openjpeg2 package (#1636669)
* Thu Oct 4 2018 Sandro Mani <manisandro@gmail.com> - 2.3.0-3
- Backport patch for CVE-2018-5785 (#1537758)
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> -
2.3.0-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Thu Feb 8 2018 Fedora Release Engineering <releng@fedoraproject.org> -
2.3.0-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1638558 - CVE-2018-18088 openjpeg2: NULL pointer dereference in
the imagetopnm function of jp2/convert.c
https://bugzilla.redhat.com/show_bug.cgi?id=1638558
[ 2 ] Bug #1542321 - CVE-2018-6616 openjpeg2: Excessive iteration in
openjp2/t1.c:opj_t1_encode_cblks can allow for denial of service via crafted BMP file
https://bugzilla.redhat.com/show_bug.cgi?id=1542321
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-200c84e08a' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung