[ubuntu/impish-proposed] libwebp 0.6.1-2ubuntu1 (Accepted)
Marc Deslauriers
marc.deslauriers at ubuntu.com
Thu May 20 12:17:12 UTC 2021
libwebp (0.6.1-2ubuntu1) impish; urgency=medium
* SECURITY UPDATE: heap-based buffer overflow in GetLE16() and GetLE24()
- debian/patches/CVE-2018-25009.patch: check data_size in
src/mux/muxread.c.
- CVE-2018-25009
- CVE-2018-25012
* SECURITY UPDATE: heap-based buffer overflow in ApplyFilter()
- debian/patches/CVE-2018-25010.patch: limit the filter size in
src/utils/quant_levels_dec_utils.c.
- CVE-2018-25010
* SECURITY UPDATE: heap-based buffer overflow in PutLE16()
- debian/patches/CVE-2018-25011.patch: limit number of image chunks in
src/mux/muxread.c.
- CVE-2018-25011
* SECURITY UPDATE: heap-based buffer overflow in ShiftBytes() and in
ReadSymbol()
- debian/patches/CVE-2018-25013_4.patch: wait for all threads to be
done in DecodeRemaining in src/dec/idec_dec.c.
- CVE-2018-25013
- CVE-2018-25014
* SECURITY UPDATE: heap-based buffer overflow in WebPDecode*Into functions
- debian/patches/CVE-2020-36328.patch: fix buffer size check in
src/dec/buffer_dec.c.
- CVE-2020-36328
* SECURITY UPDATE: use-after-free in EmitFancyRGB()
- debian/patches/CVE-2020-36329.patch: fix thread race
heap-use-after-free in src/dec/idec_dec.c.
- CVE-2020-36329
* SECURITY UPDATE: heap-based buffer overflow in ChunkVerifyAndAssign()
- debian/patches/CVE-2020-36330.patch: fix riff size checks in
src/mux/muxread.c.
- CVE-2020-36330
* SECURITY UPDATE: heap-based buffer overflow in ChunkAssignData()
- debian/patches/CVE-2020-36331.patch: validate chunk_size in
src/mux/muxi.h, src/mux/muxread.c.
- CVE-2020-36331
* SECURITY UPDATE: extreme memory allocation when reading a file
- debian/patches/CVE-2020-36332-pre1.patch: limit memory allocation
when reading invalid Huffman codes in src/dec/vp8l_dec.c.
- debian/patches/CVE-2020-36332.patch: better handling of bogus Huffman
codes in src/dec/vp8l_dec.c.
- CVE-2020-36332
Date: Thu, 20 May 2021 07:52:26 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/libwebp/0.6.1-2ubuntu1
-------------- next part --------------
Format: 1.8
Date: Thu, 20 May 2021 07:52:26 -0400
Source: libwebp
Built-For-Profiles: noudeb
Architecture: source
Version: 0.6.1-2ubuntu1
Distribution: impish
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Changes:
libwebp (0.6.1-2ubuntu1) impish; urgency=medium
.
* SECURITY UPDATE: heap-based buffer overflow in GetLE16() and GetLE24()
- debian/patches/CVE-2018-25009.patch: check data_size in
src/mux/muxread.c.
- CVE-2018-25009
- CVE-2018-25012
* SECURITY UPDATE: heap-based buffer overflow in ApplyFilter()
- debian/patches/CVE-2018-25010.patch: limit the filter size in
src/utils/quant_levels_dec_utils.c.
- CVE-2018-25010
* SECURITY UPDATE: heap-based buffer overflow in PutLE16()
- debian/patches/CVE-2018-25011.patch: limit number of image chunks in
src/mux/muxread.c.
- CVE-2018-25011
* SECURITY UPDATE: heap-based buffer overflow in ShiftBytes() and in
ReadSymbol()
- debian/patches/CVE-2018-25013_4.patch: wait for all threads to be
done in DecodeRemaining in src/dec/idec_dec.c.
- CVE-2018-25013
- CVE-2018-25014
* SECURITY UPDATE: heap-based buffer overflow in WebPDecode*Into functions
- debian/patches/CVE-2020-36328.patch: fix buffer size check in
src/dec/buffer_dec.c.
- CVE-2020-36328
* SECURITY UPDATE: use-after-free in EmitFancyRGB()
- debian/patches/CVE-2020-36329.patch: fix thread race
heap-use-after-free in src/dec/idec_dec.c.
- CVE-2020-36329
* SECURITY UPDATE: heap-based buffer overflow in ChunkVerifyAndAssign()
- debian/patches/CVE-2020-36330.patch: fix riff size checks in
src/mux/muxread.c.
- CVE-2020-36330
* SECURITY UPDATE: heap-based buffer overflow in ChunkAssignData()
- debian/patches/CVE-2020-36331.patch: validate chunk_size in
src/mux/muxi.h, src/mux/muxread.c.
- CVE-2020-36331
* SECURITY UPDATE: extreme memory allocation when reading a file
- debian/patches/CVE-2020-36332-pre1.patch: limit memory allocation
when reading invalid Huffman codes in src/dec/vp8l_dec.c.
- debian/patches/CVE-2020-36332.patch: better handling of bogus Huffman
codes in src/dec/vp8l_dec.c.
- CVE-2020-36332
Checksums-Sha1:
6fa0929424dc9f3fcb6accc66e6fa25f27c3917f 2153 libwebp_0.6.1-2ubuntu1.dsc
480287652b2cb8d8dde6762817b8cf77e9f6fef4 16740 libwebp_0.6.1-2ubuntu1.debian.tar.xz
d7c653a320cd6ef48b9391a45499e1d57d78e048 9094 libwebp_0.6.1-2ubuntu1_source.buildinfo
Checksums-Sha256:
d975af43aadfb8a35d386f658c610505854c771161d1c8b95d29aa3041b47d99 2153 libwebp_0.6.1-2ubuntu1.dsc
68601bcc967bc0b592fd232d9d8422dff20dbacff89bb2bdb56629b396f91db3 16740 libwebp_0.6.1-2ubuntu1.debian.tar.xz
07d0b2e5284a3efca7cecaaf9c7fbbc7c85f0f33e65fc77fa4a84bdd453b41f1 9094 libwebp_0.6.1-2ubuntu1_source.buildinfo
Files:
2e8a77f84e616ca966d1e57b9586e4a0 2153 libs optional libwebp_0.6.1-2ubuntu1.dsc
e7acbe6a74aba5f8c9fda6ce983c988f 16740 libs optional libwebp_0.6.1-2ubuntu1.debian.tar.xz
5057dae89819bd8c05d718fd57f40f09 9094 libs optional libwebp_0.6.1-2ubuntu1_source.buildinfo
Original-Maintainer: Jeff Breidenbach <jab at debian.org>
More information about the impish-changes
mailing list