Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1372219 - (CVE-2016-5158) CVE-2016-5158 chromium-browser, openjpeg: heap overflow due to unsafe use of opj_aligned_malloc
CVE-2016-5158 chromium-browser, openjpeg: heap overflow due to unsafe use of ...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20160831,repo...
: Reopened, Security
Depends On: 1422752 1372232 1372244 1372245 1422747 1422749 1422750 1422751 1422753 1422754 1435071
Blocks: 1372231 1374338
  Show dependency treegraph
 
Reported: 2016-09-01 04:11 EDT by Martin Prpič
Modified: 2017-03-23 00:10 EDT (History)
11 users (show)

See Also:
Fixed In Version: Chrome 53.0.2785.89
Doc Type: If docs needed, set a value
Doc Text:
An integer overflow, leading to a heap buffer overflow, was found in openjpeg, also affecting the PDF viewer in Chromium. A specially crafted JPEG2000 image could cause incorrect calculations when allocating various data structures, which could lead to a crash, or potentially, code execution.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-09-12 15:59:42 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:1854 normal SHIPPED_LIVE Important: chromium-browser security update 2016-09-12 19:39:33 EDT
Red Hat Product Errata RHSA-2017:0559 normal SHIPPED_LIVE Moderate: openjpeg security update 2017-03-20 01:22:18 EDT
Red Hat Product Errata RHSA-2017:0838 normal SHIPPED_LIVE Moderate: openjpeg security update 2017-03-23 03:45:54 EDT

  None (edit)
Description Martin Prpič 2016-09-01 04:11:29 EDT
A heap overflow flaw was found in the PDFium component of the Chromium browser.

Upstream bug(s):

https://code.google.com/p/chromium/issues/detail?id=628890

External References:

https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html
Comment 1 Martin Prpič 2016-09-01 04:19:02 EDT
Created chromium tracking bugs for this issue:

Affects: fedora-all [bug 1372232]
Comment 3 Fedora Update System 2016-09-10 16:51:47 EDT
chromium-53.0.2785.101-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
Comment 4 errata-xmlrpc 2016-09-12 15:42:00 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6 Supplementary

Via RHSA-2016:1854 https://rhn.redhat.com/errata/RHSA-2016-1854.html
Comment 5 Fedora Update System 2016-09-13 14:06:40 EDT
chromium-53.0.2785.101-1.fc25 has been pushed to the Fedora 25 stable repository. If problems still persist, please make note of it in this bug report.
Comment 9 Doran Moppert 2017-02-16 00:24:16 EST
Created openjpeg tracking bugs for this issue:

Affects: fedora-all [bug 1422752]
Comment 10 Doran Moppert 2017-02-16 00:30:28 EST
Created openjpeg2 tracking bugs for this issue:

Affects: epel-6 [bug 1422753]
Affects: epel-7 [bug 1422754]
Comment 11 Doran Moppert 2017-02-16 01:04:29 EST
Upstream bug (openjpeg):

https://github.com/uclouvain/openjpeg/issues/854
Comment 13 errata-xmlrpc 2017-03-19 21:23:23 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2017:0559 https://rhn.redhat.com/errata/RHSA-2017-0559.html
Comment 14 errata-xmlrpc 2017-03-22 23:46:18 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:0838 https://rhn.redhat.com/errata/RHSA-2017-0838.html
Comment 15 Doran Moppert 2017-03-23 00:10:29 EDT
Created openjpeg2 tracking bugs for this issue:

Affects: fedora-all [bug 1435071]

Note You need to log in before you can comment on or make changes to this bug.