First published: Wed Jan 01 2025(Updated: )
This bug is triggered when we use opj_decompress with the -r option and its argument set to 2. Version v2.5.2 also has this vulnerability. Reproducible: Always Steps to Reproduce: see <a href="https://github.com/uclouvain/openjpeg/issues/1563">https://github.com/uclouvain/openjpeg/issues/1563</a> References: <a href="https://github.com/uclouvain/openjpeg/issues/1563">https://github.com/uclouvain/openjpeg/issues/1563</a> <a href="https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8">https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8</a> <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - heap-buffer-overflow at bin/common/color.c:215:42 in sycc422_to_rgb in openjpeg/opj_decompress" href="show_bug.cgi?id=2333954">https://bugzilla.redhat.com/show_bug.cgi?id=2333954</a>
Affected Software | Affected Version | How to fix |
---|---|---|
uclouvain openjpeg |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2335172 is considered critical due to the impact it can have when decompressing images.
To fix REDHAT-BUG-2335172, upgrade to a patched version of OpenJPEG that addresses this specific vulnerability.
OpenJPEG version 2.5.2 is specifically affected by REDHAT-BUG-2335172.
The vulnerability in REDHAT-BUG-2335172 is triggered when using the opj_decompress command with the -r option set to 2.
Yes, REDHAT-BUG-2335172 is reproducible under the specified conditions listed in the bug report.