Описание
In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
openjpeg2 | fixed | 2.3.1-1 | package |
Примечания
https://github.com/uclouvain/openjpeg/issues/1053
https://github.com/rouault/openjpeg/commit/a1d32a596a94280178c44a55d7e
ubsan error (integer overflow), no security impact per se and unlikely
to trigger any security relevant issue
EPSS
Связанные уязвимости
In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
Уязвимость функции opj_t1_encode_cblks библиотеки для кодирования и декодирования изображений OpenJPEG операционных систем Oracle Solaris, позволяющая нарушителю вызвать отказ в обслуживании
EPSS