[ubuntu/impish-proposed] libwebp 0.6.1-2ubuntu1 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Thu May 20 12:17:12 UTC 2021


libwebp (0.6.1-2ubuntu1) impish; urgency=medium

  * SECURITY UPDATE: heap-based buffer overflow in GetLE16() and GetLE24()
    - debian/patches/CVE-2018-25009.patch: check data_size in
      src/mux/muxread.c.
    - CVE-2018-25009
    - CVE-2018-25012
  * SECURITY UPDATE: heap-based buffer overflow in ApplyFilter()
    - debian/patches/CVE-2018-25010.patch: limit the filter size in
      src/utils/quant_levels_dec_utils.c.
    - CVE-2018-25010
  * SECURITY UPDATE: heap-based buffer overflow in PutLE16()
    - debian/patches/CVE-2018-25011.patch: limit number of image chunks in
      src/mux/muxread.c.
    - CVE-2018-25011
  * SECURITY UPDATE: heap-based buffer overflow in ShiftBytes() and in
    ReadSymbol()
    - debian/patches/CVE-2018-25013_4.patch: wait for all threads to be
      done in DecodeRemaining in src/dec/idec_dec.c.
    - CVE-2018-25013
    - CVE-2018-25014
  * SECURITY UPDATE: heap-based buffer overflow in WebPDecode*Into functions
    - debian/patches/CVE-2020-36328.patch: fix buffer size check in
      src/dec/buffer_dec.c.
    - CVE-2020-36328
  * SECURITY UPDATE: use-after-free in EmitFancyRGB()
    - debian/patches/CVE-2020-36329.patch: fix thread race
      heap-use-after-free in src/dec/idec_dec.c.
    - CVE-2020-36329
  * SECURITY UPDATE: heap-based buffer overflow in ChunkVerifyAndAssign()
    - debian/patches/CVE-2020-36330.patch: fix riff size checks in
      src/mux/muxread.c.
    - CVE-2020-36330
  * SECURITY UPDATE: heap-based buffer overflow in ChunkAssignData()
    - debian/patches/CVE-2020-36331.patch: validate chunk_size in
      src/mux/muxi.h, src/mux/muxread.c.
    - CVE-2020-36331
  * SECURITY UPDATE: extreme memory allocation when reading a file
    - debian/patches/CVE-2020-36332-pre1.patch: limit memory allocation
      when reading invalid Huffman codes in src/dec/vp8l_dec.c.
    - debian/patches/CVE-2020-36332.patch: better handling of bogus Huffman
      codes in src/dec/vp8l_dec.c.
    - CVE-2020-36332

Date: Thu, 20 May 2021 07:52:26 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/libwebp/0.6.1-2ubuntu1
-------------- next part --------------
Format: 1.8
Date: Thu, 20 May 2021 07:52:26 -0400
Source: libwebp
Built-For-Profiles: noudeb
Architecture: source
Version: 0.6.1-2ubuntu1
Distribution: impish
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Changes:
 libwebp (0.6.1-2ubuntu1) impish; urgency=medium
 .
   * SECURITY UPDATE: heap-based buffer overflow in GetLE16() and GetLE24()
     - debian/patches/CVE-2018-25009.patch: check data_size in
       src/mux/muxread.c.
     - CVE-2018-25009
     - CVE-2018-25012
   * SECURITY UPDATE: heap-based buffer overflow in ApplyFilter()
     - debian/patches/CVE-2018-25010.patch: limit the filter size in
       src/utils/quant_levels_dec_utils.c.
     - CVE-2018-25010
   * SECURITY UPDATE: heap-based buffer overflow in PutLE16()
     - debian/patches/CVE-2018-25011.patch: limit number of image chunks in
       src/mux/muxread.c.
     - CVE-2018-25011
   * SECURITY UPDATE: heap-based buffer overflow in ShiftBytes() and in
     ReadSymbol()
     - debian/patches/CVE-2018-25013_4.patch: wait for all threads to be
       done in DecodeRemaining in src/dec/idec_dec.c.
     - CVE-2018-25013
     - CVE-2018-25014
   * SECURITY UPDATE: heap-based buffer overflow in WebPDecode*Into functions
     - debian/patches/CVE-2020-36328.patch: fix buffer size check in
       src/dec/buffer_dec.c.
     - CVE-2020-36328
   * SECURITY UPDATE: use-after-free in EmitFancyRGB()
     - debian/patches/CVE-2020-36329.patch: fix thread race
       heap-use-after-free in src/dec/idec_dec.c.
     - CVE-2020-36329
   * SECURITY UPDATE: heap-based buffer overflow in ChunkVerifyAndAssign()
     - debian/patches/CVE-2020-36330.patch: fix riff size checks in
       src/mux/muxread.c.
     - CVE-2020-36330
   * SECURITY UPDATE: heap-based buffer overflow in ChunkAssignData()
     - debian/patches/CVE-2020-36331.patch: validate chunk_size in
       src/mux/muxi.h, src/mux/muxread.c.
     - CVE-2020-36331
   * SECURITY UPDATE: extreme memory allocation when reading a file
     - debian/patches/CVE-2020-36332-pre1.patch: limit memory allocation
       when reading invalid Huffman codes in src/dec/vp8l_dec.c.
     - debian/patches/CVE-2020-36332.patch: better handling of bogus Huffman
       codes in src/dec/vp8l_dec.c.
     - CVE-2020-36332
Checksums-Sha1:
 6fa0929424dc9f3fcb6accc66e6fa25f27c3917f 2153 libwebp_0.6.1-2ubuntu1.dsc
 480287652b2cb8d8dde6762817b8cf77e9f6fef4 16740 libwebp_0.6.1-2ubuntu1.debian.tar.xz
 d7c653a320cd6ef48b9391a45499e1d57d78e048 9094 libwebp_0.6.1-2ubuntu1_source.buildinfo
Checksums-Sha256:
 d975af43aadfb8a35d386f658c610505854c771161d1c8b95d29aa3041b47d99 2153 libwebp_0.6.1-2ubuntu1.dsc
 68601bcc967bc0b592fd232d9d8422dff20dbacff89bb2bdb56629b396f91db3 16740 libwebp_0.6.1-2ubuntu1.debian.tar.xz
 07d0b2e5284a3efca7cecaaf9c7fbbc7c85f0f33e65fc77fa4a84bdd453b41f1 9094 libwebp_0.6.1-2ubuntu1_source.buildinfo
Files:
 2e8a77f84e616ca966d1e57b9586e4a0 2153 libs optional libwebp_0.6.1-2ubuntu1.dsc
 e7acbe6a74aba5f8c9fda6ce983c988f 16740 libs optional libwebp_0.6.1-2ubuntu1.debian.tar.xz
 5057dae89819bd8c05d718fd57f40f09 9094 libs optional libwebp_0.6.1-2ubuntu1_source.buildinfo
Original-Maintainer: Jeff Breidenbach <jab at debian.org>


More information about the impish-changes mailing list