A flaw was found in OpenJPEG’s encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQR4EWRFFZQDMFPZKFZ6I3USLMW6TKTP/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html | third party advisory mailing list |
https://www.debian.org/security/2021/dsa-4882 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1905723 | issue tracking third party advisory patch |
https://www.oracle.com/security-alerts/cpuoct2021.html | third party advisory patch |