First published: Wed Jul 01 2020(Updated: )
jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice. Reference: <a href="https://github.com/uclouvain/openjpeg/issues/1261">https://github.com/uclouvain/openjpeg/issues/1261</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJPEG | <2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1852869 is high due to the potential for remote code execution via use-after-free vulnerabilities.
To fix REDHAT-BUG-1852869, upgrade to OpenJPEG version 2.3.1 or later.
REDHAT-BUG-1852869 affects OpenJPEG versions prior to 2.3.1.
Yes, triggering the vulnerabilities in REDHAT-BUG-1852869 can potentially lead to data corruption.
While specific exploits for REDHAT-BUG-1852869 are not publicly documented, the vulnerability presents a significant security risk.