ALT-PU-2019-1582-1
Package libopenjpeg2.0 updated to version 2.3.1-alt1 for branch sisyphus in task 226454.
Closed vulnerabilities
BDU:2019-01566
Уязвимость функции pgxtovolume библиотеки для кодирования/декодирования изображений OpenJPEG, связанная с записью за границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании и выполнить произвольный код
BDU:2019-01567
Уязвимость функций pi_next_pcrl, pi_next_cprl, и pi_next_rpcl библиотеки для кодирования/декодирования изображений OpenJPEG, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01575
Уязвимость функции imagetopnm библиотеки для кодирования и декодирования изображений OpenJPEG, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-01576
Уязвимость функции opj_j2k_setup_encoder библиотеки для кодирования и декодирования изображений OpenJPEG, связанная с целочисленным переполнением, вызванным левым сдвигом, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-01577
Уязвимость функции opj_t1_encode_cblks библиотеки для кодирования и декодирования изображений OpenJPEG, связанная с ошибкой, приводящей к организации бесконечного цикла, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-02734
Уязвимость функции opj_t1_encode_cblks библиотеки для кодирования и декодирования изображений OpenJPEG операционных систем Oracle Solaris, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01282
Уязвимость функции color_apply_icc_profile (bin/common/color.c) библиотеки для кодирования и декодирования OpenJPEG, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01307
Уязвимость функции opj_get_encoding_parameters (openjp2/pi.c) библиотеки для кодирования и декодирования OpenJPEG, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-14041
A stack-based buffer overflow was discovered in the pgxtoimage function in bin/jp2/convert.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
- DSA-4013
- DSA-4013
- 100555
- 100555
- https://blogs.gentoo.org/ago/2017/08/28/openjpeg-stack-based-buffer-overflow-write-in-pgxtoimage-convert-c/
- https://blogs.gentoo.org/ago/2017/08/28/openjpeg-stack-based-buffer-overflow-write-in-pgxtoimage-convert-c/
- https://github.com/uclouvain/openjpeg/commit/e5285319229a5d77bf316bb0d3a6cbd3cb8666d9
- https://github.com/uclouvain/openjpeg/commit/e5285319229a5d77bf316bb0d3a6cbd3cb8666d9
- https://github.com/uclouvain/openjpeg/issues/997
- https://github.com/uclouvain/openjpeg/issues/997
Modified: 2024-11-21
CVE-2017-17479
In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
Modified: 2024-11-21
CVE-2017-17480
In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtovolume function in jp3d/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
- https://github.com/uclouvain/openjpeg/issues/1044
- https://github.com/uclouvain/openjpeg/issues/1044
- [debian-lts-announce] 20181120 [SECURITY] [DLA 1579-1] openjpeg2 security update
- [debian-lts-announce] 20181120 [SECURITY] [DLA 1579-1] openjpeg2 security update
- USN-4109-1
- USN-4109-1
- DSA-4405
- DSA-4405
Modified: 2024-11-21
CVE-2018-14423
Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in lib/openjp3d/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
- https://github.com/uclouvain/openjpeg/issues/1123
- https://github.com/uclouvain/openjpeg/issues/1123
- [debian-lts-announce] 20181222 [SECURITY] [DLA 1614-1] openjpeg2 security update
- [debian-lts-announce] 20181222 [SECURITY] [DLA 1614-1] openjpeg2 security update
- USN-4109-1
- USN-4109-1
- DSA-4405
- DSA-4405
Modified: 2024-11-21
CVE-2018-16375
An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow.
Modified: 2024-11-21
CVE-2018-16376
An issue was discovered in OpenJPEG 2.3.0. A heap-based buffer overflow was discovered in the function t2_encode_packet in lib/openmj2/t2.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact.
Modified: 2024-11-21
CVE-2018-18088
OpenJPEG 2.3.0 has a NULL pointer dereference for "red" in the imagetopnm function of jp2/convert.c
- https://github.com/uclouvain/openjpeg/issues/1152
- https://github.com/uclouvain/openjpeg/issues/1152
- [debian-lts-announce] 20181120 [SECURITY] [DLA 1579-1] openjpeg2 security update
- [debian-lts-announce] 20181120 [SECURITY] [DLA 1579-1] openjpeg2 security update
- USN-4109-1
- USN-4109-1
- DSA-4405
- DSA-4405
Modified: 2024-11-21
CVE-2018-20845
Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
Modified: 2024-11-21
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
Modified: 2024-11-21
CVE-2018-20847
An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow.
- 108921
- 108921
- https://github.com/uclouvain/openjpeg/commit/5d00b719f4b93b1445e6fb4c766b9a9883c57949
- https://github.com/uclouvain/openjpeg/commit/5d00b719f4b93b1445e6fb4c766b9a9883c57949
- https://github.com/uclouvain/openjpeg/issues/431
- https://github.com/uclouvain/openjpeg/issues/431
- https://github.com/uclouvain/openjpeg/pull/1168/commits/c58df149900df862806d0e892859b41115875845
- https://github.com/uclouvain/openjpeg/pull/1168/commits/c58df149900df862806d0e892859b41115875845
- [debian-lts-announce] 20190710 [SECURITY] [DLA 1851-1] openjpeg2 security update
- [debian-lts-announce] 20190710 [SECURITY] [DLA 1851-1] openjpeg2 security update
Modified: 2024-11-21
CVE-2018-21010
OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c.
- https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea
- https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea
- [debian-lts-announce] 20191008 [SECURITY] [DLA 1950-1] openjpeg2 security update
- [debian-lts-announce] 20191008 [SECURITY] [DLA 1950-1] openjpeg2 security update
- GLSA-202101-29
- GLSA-202101-29
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
Modified: 2024-11-21
CVE-2018-5727
In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
Modified: 2024-11-21
CVE-2018-5785
In OpenJPEG 2.3.0, there is an integer overflow caused by an out-of-bounds left shift in the opj_j2k_setup_encoder function (openjp2/j2k.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
Modified: 2024-11-21
CVE-2018-6616
In OpenJPEG 2.3.0, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
- https://github.com/uclouvain/openjpeg/issues/1059
- https://github.com/uclouvain/openjpeg/issues/1059
- [debian-lts-announce] 20181222 [SECURITY] [DLA 1614-1] openjpeg2 security update
- [debian-lts-announce] 20181222 [SECURITY] [DLA 1614-1] openjpeg2 security update
- USN-4109-1
- USN-4109-1
- DSA-4405
- DSA-4405
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Modified: 2024-11-21
CVE-2018-7648
An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line.
Modified: 2024-11-21
CVE-2019-6988
An issue was discovered in OpenJPEG 2.3.0. It allows remote attackers to cause a denial of service (attempted excessive memory allocation) in opj_calloc in openjp2/opj_malloc.c, when called from opj_tcd_init_tile in openjp2/tcd.c, as demonstrated by the 64-bit opj_decompress.