Bug 835767 (CVE-2012-3358)

Summary: CVE-2012-3358 openjpeg: heap-based buffer overflow when processing JPEG2000 image files
Product: [Other] Security Response Reporter: Huzaifa S. Sidhpurwala <huzaifas>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: jlieskov, security-response-team, tgl
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2012-07-11 17:03:30 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 812319, 831561, 831562, 839125    
Bug Blocks: 812327    
Description Flags
openjpeg-tile-sanity.patch none

Description Huzaifa S. Sidhpurwala 2012-06-27 04:51:26 UTC
A heap-based buffer overflow was found in the way OpenJPEG, an open-source JPEG 2000 codec written in C language, performed parsing of JPEG2000 having certain number of tiles and tilesizes. A remote attacker could provide a specially crafted JPEG 2000 file, which when opened in an application linked against openjpeg would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application.

Comment 4 Tom Lane 2012-06-27 05:17:22 UTC
Created attachment 594684 [details]

Um, this is the relevant patch, not that one.

Comment 5 Vincent Danen 2012-07-10 16:41:13 UTC
This is now public:


Comment 6 Huzaifa S. Sidhpurwala 2012-07-11 03:33:44 UTC
Here is the upstream commit:


Comment 7 Huzaifa S. Sidhpurwala 2012-07-11 03:41:00 UTC
Created openjpeg tracking bugs for this issue

Affects: fedora-all [bug 839125]

Comment 8 errata-xmlrpc 2012-07-11 16:42:15 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1068 https://rhn.redhat.com/errata/RHSA-2012-1068.html