Bug 835767 (CVE-2012-3358) - CVE-2012-3358 openjpeg: heap-based buffer overflow when processing JPEG2000 image files
Summary: CVE-2012-3358 openjpeg: heap-based buffer overflow when processing JPEG2000 i...
Alias: CVE-2012-3358
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 812319 831561 831562 839125
Blocks: 812327
TreeView+ depends on / blocked
Reported: 2012-06-27 04:51 UTC by Huzaifa S. Sidhpurwala
Modified: 2019-09-29 12:53 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2012-07-11 17:03:30 UTC

Attachments (Terms of Use)
openjpeg-tile-sanity.patch (1.59 KB, patch)
2012-06-27 05:17 UTC, Tom Lane
no flags Details | Diff

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:1068 0 normal SHIPPED_LIVE Important: openjpeg security update 2012-07-11 20:40:45 UTC

Description Huzaifa S. Sidhpurwala 2012-06-27 04:51:26 UTC
A heap-based buffer overflow was found in the way OpenJPEG, an open-source JPEG 2000 codec written in C language, performed parsing of JPEG2000 having certain number of tiles and tilesizes. A remote attacker could provide a specially crafted JPEG 2000 file, which when opened in an application linked against openjpeg would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application.

Comment 4 Tom Lane 2012-06-27 05:17:22 UTC
Created attachment 594684 [details]

Um, this is the relevant patch, not that one.

Comment 5 Vincent Danen 2012-07-10 16:41:13 UTC
This is now public:


Comment 6 Huzaifa S. Sidhpurwala 2012-07-11 03:33:44 UTC
Here is the upstream commit:


Comment 7 Huzaifa S. Sidhpurwala 2012-07-11 03:41:00 UTC
Created openjpeg tracking bugs for this issue

Affects: fedora-all [bug 839125]

Comment 8 errata-xmlrpc 2012-07-11 16:42:15 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1068 https://rhn.redhat.com/errata/RHSA-2012-1068.html

Note You need to log in before you can comment on or make changes to this bug.