what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2021-4251-04

Red Hat Security Advisory 2021-4251-04
Posted Nov 10, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-4251-04 - OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Issues addressed include buffer overflow, code execution, denial of service, double free, integer overflow, null pointer, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2018-20845, CVE-2018-20847, CVE-2018-5727, CVE-2018-5785, CVE-2019-12973, CVE-2020-15389, CVE-2020-27814, CVE-2020-27823, CVE-2020-27824, CVE-2020-27842, CVE-2020-27843, CVE-2020-27845, CVE-2021-29338, CVE-2021-3575
SHA-256 | 7b38b3e2d2fd976a24d1cdc65e2f987a5a7dbc8389e2c3137e8588a351a2710a

Red Hat Security Advisory 2021-4251-04

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: openjpeg2 security update
Advisory ID: RHSA-2021:4251-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:4251
Issue date: 2021-11-09
CVE Names: CVE-2018-5727 CVE-2018-5785 CVE-2018-20845
CVE-2018-20847 CVE-2019-12973 CVE-2020-15389
CVE-2020-27814 CVE-2020-27823 CVE-2020-27824
CVE-2020-27842 CVE-2020-27843 CVE-2020-27845
CVE-2021-3575 CVE-2021-29338
====================================================================
1. Summary:

An update for openjpeg2 is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux CRB (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

OpenJPEG is an open source library for reading and writing image files in
JPEG2000 format.

The following packages have been upgraded to a later upstream version:
openjpeg2 (2.4.0).

Security Fix(es):

* openjpeg: use-after-free and double-free via a mix of valid and invalid
files in a directory operated on by the decompressor (CVE-2020-15389)

* openjpeg: heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS
(CVE-2020-27814)

* openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode()
(CVE-2020-27823)

* openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary
code execution (CVE-2021-3575)

* openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c
(CVE-2018-5727)

* openjpeg: integer overflow in opj_j2k_setup_encoder function in
openjp2/j2k.c (CVE-2018-5785)

* openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and
pi_next_rpcl in openmj2/pi.c (CVE-2018-20845)

* openjpeg: integer overflow in function opj_get_encoding_parameters in
openjp2/pi.c (CVE-2018-20847)

* openjpeg: denial of service in function opj_t1_encode_cblks in
openjp2/t1.c (CVE-2019-12973)

* openjpeg: global-buffer-overflow read in
opj_dwt_calc_explicit_stepsizes() (CVE-2020-27824)

* openjpeg: null pointer dereference in opj_tgt_reset function in
lib/openjp2/tgt.c (CVE-2020-27842)

* openjpeg: out-of-bounds read in opj_t2_encode_packet function in
openjp2/t2.c (CVE-2020-27843)

* openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp,
opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (CVE-2020-27845)

* openjpeg: out-of-bounds write due to an integer overflow in
opj_compress.c (CVE-2021-29338)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.5 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1536552 - CVE-2018-5727 openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c
1537758 - CVE-2018-5785 openjpeg: integer overflow in opj_j2k_setup_encoder function in openjp2/j2k.c
1728505 - CVE-2018-20845 openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c
1728509 - CVE-2018-20847 openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c
1732270 - CVE-2019-12973 openjpeg: denial of service in function opj_t1_encode_cblks in openjp2/t1.c
1852869 - CVE-2020-15389 openjpeg: use-after-free and double-free via a mix of valid and invalid files in a directory operated on by the decompressor
1901998 - CVE-2020-27814 openjpeg: heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS
1905723 - CVE-2020-27824 openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes()
1905762 - CVE-2020-27823 openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode()
1907513 - CVE-2020-27842 openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c
1907516 - CVE-2020-27843 openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c
1907523 - CVE-2020-27845 openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c
1950101 - CVE-2021-29338 openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c
1957616 - CVE-2021-3575 openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
openjpeg2-2.4.0-4.el8.src.rpm

aarch64:
openjpeg2-2.4.0-4.el8.aarch64.rpm
openjpeg2-debuginfo-2.4.0-4.el8.aarch64.rpm
openjpeg2-debugsource-2.4.0-4.el8.aarch64.rpm
openjpeg2-tools-2.4.0-4.el8.aarch64.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.aarch64.rpm

noarch:
openjpeg2-devel-docs-2.4.0-4.el8.noarch.rpm

ppc64le:
openjpeg2-2.4.0-4.el8.ppc64le.rpm
openjpeg2-debuginfo-2.4.0-4.el8.ppc64le.rpm
openjpeg2-debugsource-2.4.0-4.el8.ppc64le.rpm
openjpeg2-tools-2.4.0-4.el8.ppc64le.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.ppc64le.rpm

s390x:
openjpeg2-2.4.0-4.el8.s390x.rpm
openjpeg2-debuginfo-2.4.0-4.el8.s390x.rpm
openjpeg2-debugsource-2.4.0-4.el8.s390x.rpm
openjpeg2-tools-2.4.0-4.el8.s390x.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.s390x.rpm

x86_64:
openjpeg2-2.4.0-4.el8.i686.rpm
openjpeg2-2.4.0-4.el8.x86_64.rpm
openjpeg2-debuginfo-2.4.0-4.el8.i686.rpm
openjpeg2-debuginfo-2.4.0-4.el8.x86_64.rpm
openjpeg2-debugsource-2.4.0-4.el8.i686.rpm
openjpeg2-debugsource-2.4.0-4.el8.x86_64.rpm
openjpeg2-tools-2.4.0-4.el8.x86_64.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.i686.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.x86_64.rpm

Red Hat Enterprise Linux CRB (v. 8):

aarch64:
openjpeg2-debuginfo-2.4.0-4.el8.aarch64.rpm
openjpeg2-debugsource-2.4.0-4.el8.aarch64.rpm
openjpeg2-devel-2.4.0-4.el8.aarch64.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.aarch64.rpm

ppc64le:
openjpeg2-debuginfo-2.4.0-4.el8.ppc64le.rpm
openjpeg2-debugsource-2.4.0-4.el8.ppc64le.rpm
openjpeg2-devel-2.4.0-4.el8.ppc64le.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.ppc64le.rpm

s390x:
openjpeg2-debuginfo-2.4.0-4.el8.s390x.rpm
openjpeg2-debugsource-2.4.0-4.el8.s390x.rpm
openjpeg2-devel-2.4.0-4.el8.s390x.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.s390x.rpm

x86_64:
openjpeg2-debuginfo-2.4.0-4.el8.i686.rpm
openjpeg2-debuginfo-2.4.0-4.el8.x86_64.rpm
openjpeg2-debugsource-2.4.0-4.el8.i686.rpm
openjpeg2-debugsource-2.4.0-4.el8.x86_64.rpm
openjpeg2-devel-2.4.0-4.el8.i686.rpm
openjpeg2-devel-2.4.0-4.el8.x86_64.rpm
openjpeg2-tools-2.4.0-4.el8.i686.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.i686.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-5727
https://access.redhat.com/security/cve/CVE-2018-5785
https://access.redhat.com/security/cve/CVE-2018-20845
https://access.redhat.com/security/cve/CVE-2018-20847
https://access.redhat.com/security/cve/CVE-2019-12973
https://access.redhat.com/security/cve/CVE-2020-15389
https://access.redhat.com/security/cve/CVE-2020-27814
https://access.redhat.com/security/cve/CVE-2020-27823
https://access.redhat.com/security/cve/CVE-2020-27824
https://access.redhat.com/security/cve/CVE-2020-27842
https://access.redhat.com/security/cve/CVE-2020-27843
https://access.redhat.com/security/cve/CVE-2020-27845
https://access.redhat.com/security/cve/CVE-2021-3575
https://access.redhat.com/security/cve/CVE-2021-29338
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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QXPl
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close