Heap-based buffer overflow vulnerability in the opj_mqc_byteout function in mqc.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (application crash) via a crafted bmp file. Upstream bug: https://github.com/uclouvain/openjpeg/issues/731 https://github.com/uclouvain/openjpeg/issues/732 https://github.com/uclouvain/openjpeg/issues/777 https://github.com/uclouvain/openjpeg/issues/778 https://github.com/uclouvain/openjpeg/issues/779 https://github.com/uclouvain/openjpeg/issues/780 Upstream patch: https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b References: https://bugs.gentoo.org/show_bug.cgi?id=629372
Created mingw-openjpeg tracking bugs for this issue: Affects: fedora-all [bug 1487379] Created mingw-openjpeg2 tracking bugs for this issue: Affects: fedora-all [bug 1487380] Created openjpeg tracking bugs for this issue: Affects: fedora-all [bug 1487378] Created openjpeg2 tracking bugs for this issue: Affects: epel-all [bug 1487381] Affects: fedora-all [bug 1487382]