Integer overflow vulnerability in the bmp24toimage function in convertbmp.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted bmp file. Upstream bug: https://github.com/uclouvain/openjpeg/issues/833 Upstream patch: https://github.com/uclouvain/openjpeg/commit/da940424816e11d624362ce080bc026adffa26e8 References: https://bugs.gentoo.org/show_bug.cgi?id=629372
Created mingw-openjpeg tracking bugs for this issue: Affects: fedora-all [bug 1487379] Created mingw-openjpeg2 tracking bugs for this issue: Affects: fedora-all [bug 1487380] Created openjpeg tracking bugs for this issue: Affects: fedora-all [bug 1487378] Created openjpeg2 tracking bugs for this issue: Affects: epel-all [bug 1487381] Affects: fedora-all [bug 1487382]