A size-validation issue was discovered in opj_j2k_write_sot in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to denial of service (heap-based buffer overflow affecting opj_write_bytes_LE in lib/openjp2/cio.c) or possibly remote code execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-14152. Upstream issue: https://github.com/uclouvain/openjpeg/issues/991 Upstream patch: https://github.com/uclouvain/openjpeg/commit/dcac91b8c72f743bda7dbfa9032356bc8110098a
Created mingw-openjpeg tracking bugs for this issue: Affects: fedora-all [bug 1487773] Created mingw-openjpeg2 tracking bugs for this issue: Affects: fedora-all [bug 1487772] Created openjpeg tracking bugs for this issue: Affects: fedora-all [bug 1487770] Created openjpeg2 tracking bugs for this issue: Affects: epel-all [bug 1487769] Affects: fedora-all [bug 1487771]