Integer overflow in the opjpicreate_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libopenjp2-7", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjp2-7-dbg", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjp2-7-dbgsym", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjp2-7-dev", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjp2-7-dev-dbgsym", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjp2-tools", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjp2-tools-dbgsym", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjp3d-tools", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjp3d-tools-dbgsym", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjp3d7", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjp3d7-dbgsym", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjpip-dec-server", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjpip-dec-server-dbgsym", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjpip-server", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjpip-server-dbgsym", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjpip-viewer", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjpip7", "binary_version": "2.1.0-2.1ubuntu0.1" }, { "binary_name": "libopenjpip7-dbgsym", "binary_version": "2.1.0-2.1ubuntu0.1" } ], "ubuntu_priority": "medium" }