Your message dated Sat, 06 Sep 2025 12:14:50 +0100
with message-id
<ee4c0876608d99eb3f8b333b556fbd92e7a652eb.ca...@adam-barratt.org.uk>
and subject line Closing p-u requests for fixes included in 12.12
has caused the Debian Bug report #1110686,
regarding bookworm-pu: package openjpeg2/2.5.0-2+deb12u2
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1110686: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110686
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bookworm, moreinfo
X-Debbugs-Cc: [email protected], [email protected]
Control: affects -1 + src:openjpeg2
User: [email protected]
Usertags: pu
* CVE-2025-50952: Avoid potential undefined behaviour
in opj_dwt_decode_tile()
Tagged moreinfo, as question to the security team whether they want
this in pu or as DSA.
diffstat for openjpeg2-2.5.0 openjpeg2-2.5.0
changelog | 8
++
patches/0001-opj_dwt_decode_tile-avoid-potential-UndefinedBehavio.patch | 28
++++++++++
patches/series | 1
3 files changed, 37 insertions(+)
diff -Nru openjpeg2-2.5.0/debian/changelog openjpeg2-2.5.0/debian/changelog
--- openjpeg2-2.5.0/debian/changelog 2025-01-24 18:41:23.000000000 +0200
+++ openjpeg2-2.5.0/debian/changelog 2025-08-10 03:05:29.000000000 +0300
@@ -1,3 +1,11 @@
+openjpeg2 (2.5.0-2+deb12u2) bookworm; urgency=medium
+
+ * Non-maintainer upload.
+ * CVE-2025-50952: Avoid potential undefined behaviour
+ in opj_dwt_decode_tile()
+
+ -- Adrian Bunk <[email protected]> Sun, 10 Aug 2025 03:05:29 +0300
+
openjpeg2 (2.5.0-2+deb12u1) bookworm-security; urgency=medium
* CVE-2021-3575 (Closes: #989775)
diff -Nru
openjpeg2-2.5.0/debian/patches/0001-opj_dwt_decode_tile-avoid-potential-UndefinedBehavio.patch
openjpeg2-2.5.0/debian/patches/0001-opj_dwt_decode_tile-avoid-potential-UndefinedBehavio.patch
---
openjpeg2-2.5.0/debian/patches/0001-opj_dwt_decode_tile-avoid-potential-UndefinedBehavio.patch
1970-01-01 02:00:00.000000000 +0200
+++
openjpeg2-2.5.0/debian/patches/0001-opj_dwt_decode_tile-avoid-potential-UndefinedBehavio.patch
2025-08-10 03:05:04.000000000 +0300
@@ -0,0 +1,28 @@
+From d4ac96d6460a9f4cc4519dbfcc7da6ad385bbe58 Mon Sep 17 00:00:00 2001
+From: Even Rouault <[email protected]>
+Date: Sun, 18 Feb 2024 17:17:00 +0100
+Subject: opj_dwt_decode_tile(): avoid potential UndefinedBehaviorSanitizer
+ 'applying zero offset to null pointer' (fixes #1505)
+
+---
+ src/lib/openjp2/dwt.c | 4 +++-
+ 1 file changed, 3 insertions(+), 1 deletion(-)
+
+diff --git a/src/lib/openjp2/dwt.c b/src/lib/openjp2/dwt.c
+index abc500ec..6b18c5dd 100644
+--- a/src/lib/openjp2/dwt.c
++++ b/src/lib/openjp2/dwt.c
+@@ -2083,7 +2083,9 @@ static OPJ_BOOL opj_dwt_decode_tile(opj_thread_pool_t*
tp,
+ OPJ_SIZE_T h_mem_size;
+ int num_threads;
+
+- if (numres == 1U) {
++ /* Not entirely sure for the return code of w == 0 which is triggered per
*/
++ /* https://github.com/uclouvain/openjpeg/issues/1505 */
++ if (numres == 1U || w == 0) {
+ return OPJ_TRUE;
+ }
+ num_threads = opj_thread_pool_get_thread_count(tp);
+--
+2.30.2
+
diff -Nru openjpeg2-2.5.0/debian/patches/series
openjpeg2-2.5.0/debian/patches/series
--- openjpeg2-2.5.0/debian/patches/series 2025-01-24 18:17:00.000000000
+0200
+++ openjpeg2-2.5.0/debian/patches/series 2025-08-10 03:05:29.000000000
+0300
@@ -4,3 +4,4 @@
CVE-2023-39327.patch
CVE-2024-56826.patch
CVE-2024-56827.patch
+0001-opj_dwt_decode_tile-avoid-potential-UndefinedBehavio.patch
--- End Message ---
--- Begin Message ---
Package: release.debian.org
Version: 12.12
Hi,
Each of the updates referenced by these requests was included in
today's 12.12 point release for bookworm.
Regards,
Adam
--- End Message ---