Bug 1732270 (CVE-2019-12973) - CVE-2019-12973 openjpeg: denial of service in function opj_t1_encode_cblks in openjp2/t1.c
Summary: CVE-2019-12973 openjpeg: denial of service in function opj_t1_encode_cblks in...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-12973
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1732271 1732272 1732273 1732274 1739076
Blocks: 1732275
TreeView+ depends on / blocked
 
Reported: 2019-07-23 06:05 UTC by Dhananjay Arunesh
Modified: 2021-11-09 17:56 UTC (History)
12 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-27 10:47:07 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:4251 0 None None None 2021-11-09 17:56:08 UTC

Description Dhananjay Arunesh 2019-07-23 06:05:08 UTC
In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks
function of openjp2/t1.c. Remote attackers could leverage this vulnerability to
cause a denial of service via a crafted bmp file. This issue is similar to
CVE-2018-6616.

Reference:
https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3
https://github.com/uclouvain/openjpeg/pull/1185/commits/cbe7384016083eac16078b359acd7a842253d503

Comment 1 Dhananjay Arunesh 2019-07-23 06:05:54 UTC
Created mingw-openjpeg2 tracking bugs for this issue:

Affects: fedora-all [bug 1732273]


Created openjpeg tracking bugs for this issue:

Affects: fedora-all [bug 1732272]


Created openjpeg2 tracking bugs for this issue:

Affects: epel-all [bug 1732274]
Affects: fedora-all [bug 1732271]

Comment 6 errata-xmlrpc 2021-11-09 17:56:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:4251 https://access.redhat.com/errata/RHSA-2021:4251


Note You need to log in before you can comment on or make changes to this bug.