n our-of-bounds read vulnerability in sycc422_to_rgb function triggered by specially crafted JPEG2000 image file was found in openjpeg version 2016.03.14. CVE request (contains reproducer): http://seclists.org/oss-sec/2016/q1/632
Created mingw-openjpeg2 tracking bugs for this issue: Affects: fedora-all [bug 1317831]
Created openjpeg2 tracking bugs for this issue: Affects: fedora-all [bug 1317830] Affects: epel-all [bug 1317832]
CVE assignment: http://seclists.org/oss-sec/2016/q1/668
Patch: https://github.com/uclouvain/openjpeg/commit/15f081c89650dccee4aa4ae66f614c3fdb268767
openjpeg2-2.1.1-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
openjpeg2-2.1.1-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
mingw-openjpeg2-2.1.1-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
mingw-openjpeg2-2.1.1-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
Upstream ticket: https://github.com/uclouvain/openjpeg/issues/726
openjpeg-1 is not affected based on testing with the reproducer. The code looks similar, but triggering the out-of-bounds condition seems to require component options that are not supported. Chromium uses a C++ checked integer type here.