Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during opj_aligned_malloc calls in dwt.c and t1.c.
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Leap | Opensuse | 42.1 (including) | 42.1 (including) |
Red Hat Enterprise Linux 6 | RedHat | openjpeg-0:1.3-16.el6_8 | * |
Red Hat Enterprise Linux 6 Supplementary | RedHat | chromium-browser-0:53.0.2785.89-3.el6 | * |
Red Hat Enterprise Linux 7 | RedHat | openjpeg-0:1.5.1-16.el7_3 | * |
Chromium-browser | Ubuntu | artful | * |
Chromium-browser | Ubuntu | bionic | * |
Chromium-browser | Ubuntu | cosmic | * |
Chromium-browser | Ubuntu | devel | * |
Chromium-browser | Ubuntu | disco | * |
Chromium-browser | Ubuntu | eoan | * |
Chromium-browser | Ubuntu | precise | * |
Chromium-browser | Ubuntu | trusty | * |
Chromium-browser | Ubuntu | upstream | * |
Chromium-browser | Ubuntu | xenial | * |
Chromium-browser | Ubuntu | yakkety | * |
Chromium-browser | Ubuntu | zesty | * |
Openjpeg | Ubuntu | precise | * |
Openjpeg | Ubuntu | trusty | * |
Openjpeg | Ubuntu | yakkety | * |
Openjpeg2 | Ubuntu | artful | * |
Openjpeg2 | Ubuntu | upstream | * |
Openjpeg2 | Ubuntu | xenial | * |
Openjpeg2 | Ubuntu | yakkety | * |
Openjpeg2 | Ubuntu | zesty | * |