Bug 1525086 (CVE-2017-17479)

Summary: CVE-2017-17479 openjpeg: Stack-buffer overflow in the pgxtoimage function
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: extras-orphan, fedora, hobbes1069, jaromir.capik, manisandro, nforro, rdieter
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-12-13 12:46:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1487769, 1487770, 1487771, 1487772, 1487773    
Bug Blocks: 1525090    

Description Andrej Nemec 2017-12-12 15:15:47 UTC
In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to denial of service or possibly code execution.

Upstream issue:

https://github.com/uclouvain/openjpeg/issues/1044

Comment 1 Andrej Nemec 2017-12-12 15:20:12 UTC
Created mingw-openjpeg tracking bugs for this issue:

Affects: fedora-all [bug 1487773]


Created mingw-openjpeg2 tracking bugs for this issue:

Affects: fedora-all [bug 1487772]


Created openjpeg tracking bugs for this issue:

Affects: fedora-all [bug 1487770]


Created openjpeg2 tracking bugs for this issue:

Affects: epel-all [bug 1487769]
Affects: fedora-all [bug 1487771]

Comment 3 Stefan Cornelius 2017-12-13 12:46:43 UTC
Mitigated by stack canaries, so code execution should be very hard and in general, this should be limited to a crash.

Comment 4 Stefan Cornelius 2017-12-13 12:46:53 UTC
Statement:

This issue affects the versions of openjpeg as shipped with Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Red Hat Enterprise Linux 6 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.