A heap-buffer overflow was found in the way openjpeg2 handled certain PNG format files. An attacker could use this flaw to cause an application crash or in some cases execute arbitrary code with the permission of the user running such an application.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1901998 | issue tracking third party advisory patch |
https://github.com/uclouvain/openjpeg/issues/1283 | issue tracking exploit third party advisory |
https://security.gentoo.org/glsa/202101-29 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html | third party advisory mailing list |
https://www.debian.org/security/2021/dsa-4882 | third party advisory vendor advisory |
https://www.oracle.com//security-alerts/cpujul2021.html | third party advisory |