Описание
In FreeImage 3.18.0, an out-of-bounds access occurs because of mishandling of the OpenJPEG j2k_read_ppm_v3 function in j2k.c. The value of l_N_ppm comes from the file read in, and the code does not consider that l_N_ppm may be greater than the size of p_header_data.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| freeimage | unfixed | package | ||
| freeimage | postponed | trixie | package | |
| freeimage | postponed | bookworm | package | |
| freeimage | postponed | bullseye | package | |
| freeimage | postponed | buster | package | |
| freeimage | postponed | stretch | package | |
| freeimage | postponed | jessie | package |
Примечания
https://sourceforge.net/p/freeimage/discussion/36111/thread/e06734bed5/
very few information regarding this vulnerability, which is seemingly located
in libopenjpeg, not freeimage. Without reproducer or stacktrace, this is
nearly unfixable.
EPSS
Связанные уязвимости
In FreeImage 3.18.0, an out-of-bounds access occurs because of mishandling of the OpenJPEG j2k_read_ppm_v3 function in j2k.c. The value of l_N_ppm comes from the file read in, and the code does not consider that l_N_ppm may be greater than the size of p_header_data.
In FreeImage 3.18.0, an out-of-bounds access occurs because of mishandling of the OpenJPEG j2k_read_ppm_v3 function in j2k.c. The value of l_N_ppm comes from the file read in, and the code does not consider that l_N_ppm may be greater than the size of p_header_data.
In FreeImage 3.18.0, an out-of-bounds access occurs because of mishandling of the OpenJPEG j2k_read_ppm_v3 function in j2k.c. The value of l_N_ppm comes from the file read in, and the code does not consider that l_N_ppm may be greater than the size of p_header_data.
EPSS