Heap-based buffer overflow vulnerability in the opj_mqc_flush function in mqc.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (application crash) via a crafted bmp file. Upstream bug: https://github.com/uclouvain/openjpeg/issues/982 Upstream patch: https://github.com/uclouvain/openjpeg/commit/afb308b9ccbe129608c9205cf3bb39bbefad90b9 References: https://bugs.mageia.org/show_bug.cgi?id=21572 https://blogs.gentoo.org/ago/2017/08/16/openjpeg-heap-based-buffer-overflow-in-opj_mqc_flush-mqc-c/
Created mingw-openjpeg tracking bugs for this issue: Affects: fedora-all [bug 1487392] Created mingw-openjpeg2 tracking bugs for this issue: Affects: fedora-all [bug 1487395] Created openjpeg tracking bugs for this issue: Affects: fedora-all [bug 1487391] Created openjpeg2 tracking bugs for this issue: Affects: epel-all [bug 1487393] Affects: fedora-all [bug 1487394]