Bug 1626088 (CVE-2018-16375) - CVE-2018-16375 openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c
Summary: CVE-2018-16375 openjpeg: Heap-based buffer overflow in pnmtoimage function in...
Alias: CVE-2018-16375
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1626330 1626331 1626332 1626333 1626334 1626336
Blocks: 1626090
TreeView+ depends on / blocked
Reported: 2018-09-06 14:44 UTC by Pedro Sampaio
Modified: 2021-02-01 08:41 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2021-02-01 08:41:46 UTC

Attachments (Terms of Use)

Description Pedro Sampaio 2018-09-06 14:44:28 UTC
An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow.

Upstream bug:


Comment 1 Huzaifa S. Sidhpurwala 2018-09-07 04:35:42 UTC
Upstream issue: https://github.com/uclouvain/openjpeg/issues/861
Patch: https://github.com/uclouvain/openjpeg/commit/c22cbd8bdf8ff2ae372f94391a4be2d322b36b41

Heap-buffer overflow while converting image from PNM format. Specially-crafted values in the header, could cause integer overflow. This leads to a small buffer being allocated. Later when file contents are read into this buffer it leads to heap-overflow. Arbitrary code execution could be possible.

Comment 2 Huzaifa S. Sidhpurwala 2018-09-07 04:36:40 UTC
Created mingw-openjpeg2 tracking bugs for this issue:

Affects: fedora-all [bug 1626333]

Created openjpeg tracking bugs for this issue:

Affects: fedora-all [bug 1626330]

Created openjpeg2 tracking bugs for this issue:

Affects: epel-all [bug 1626331]
Affects: fedora-all [bug 1626332]

Comment 6 Product Security DevOps Team 2021-02-01 08:41:46 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):


Note You need to log in before you can comment on or make changes to this bug.