Bug 1036499 (CVE-2013-6054) - CVE-2013-6054 openjpeg: heap-based buffer overflows in version 1.3
Summary: CVE-2013-6054 openjpeg: heap-based buffer overflows in version 1.3
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-6054
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1038411 1038985 1038987
Blocks: 1036502
TreeView+ depends on / blocked
 
Reported: 2013-12-02 07:08 UTC by Murray McAllister
Modified: 2023-05-12 15:34 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2015-08-22 16:54:59 UTC
Embargoed:


Attachments (Terms of Use)
proposed patch (1.12 KB, patch)
2013-12-02 07:39 UTC, Murray McAllister
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:1850 0 normal SHIPPED_LIVE Important: openjpeg security update 2013-12-17 23:36:51 UTC

Description Murray McAllister 2013-12-02 07:08:16 UTC
Raphael Geissert discovered multiple heap-based buffer overflows in OpenJPEG. If a specially-crafted image were opened by an application linked against OpenJPEG, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

These issues only affected the version of OpenJPEG as shipped in Red Hat Enterprise Linux 6 and EPEL 5 (version 1.3).

Comment 1 Murray McAllister 2013-12-02 07:39:33 UTC
Created attachment 831466 [details]
proposed patch

Comment 2 Murray McAllister 2013-12-02 14:07:14 UTC
Acknowledgements:

Red Hat would like to thank Raphael Geissert for reporting these issues during a review for EDF.

Comment 3 Murray McAllister 2013-12-05 05:12:52 UTC
Created openjpeg tracking bugs for this issue:

Affects: epel-5 [bug 1038411]

Comment 5 errata-xmlrpc 2013-12-17 18:42:42 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:1850 https://rhn.redhat.com/errata/RHSA-2013-1850.html


Note You need to log in before you can comment on or make changes to this bug.