{"schema_version": "1.3.1", "id": "RLSA-2021:4251", "modified": "2023-02-02T14:11:55.189055Z", "published": "2021-11-09T08:51:11Z", "related": ["CVE-2018-20845", "CVE-2018-20847", "CVE-2018-5727", "CVE-2018-5785", "CVE-2019-12973", "CVE-2020-15389", "CVE-2020-27814", "CVE-2020-27823", "CVE-2020-27824", "CVE-2020-27842", "CVE-2020-27843", "CVE-2020-27845", "CVE-2021-29338", "CVE-2021-3575"], "summary": "Moderate: openjpeg2 security update", "details": "OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.\n\nThe following packages have been upgraded to a later upstream version: openjpeg2 (2.4.0).\n\nSecurity Fix(es):\n\n* openjpeg: use-after-free and double-free via a mix of valid and invalid files in a directory operated on by the decompressor (CVE-2020-15389)\n\n* openjpeg: heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS (CVE-2020-27814)\n\n* openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode() (CVE-2020-27823)\n\n* openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution (CVE-2021-3575)\n\n* openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c (CVE-2018-5727)\n\n* openjpeg: integer overflow in opj_j2k_setup_encoder function in openjp2/j2k.c (CVE-2018-5785)\n\n* openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c (CVE-2018-20845)\n\n* openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c (CVE-2018-20847)\n\n* openjpeg: denial of service in function opj_t1_encode_cblks in openjp2/t1.c (CVE-2019-12973)\n\n* openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes() (CVE-2020-27824)\n\n* openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c (CVE-2020-27842)\n\n* openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c (CVE-2020-27843)\n\n* openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (CVE-2020-27845)\n\n* openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c (CVE-2021-29338)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}], "affected": [{"package": {"ecosystem": "Rocky Linux:8", "name": "openjpeg2", "purl": "pkg:rpm/rocky-linux/openjpeg2?distro=rocky-linux-8-5-legacy&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:2.4.0-4.el8"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2021:4251"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536552"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537758"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728505"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728509"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732270"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852869"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901998"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905723"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905762"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907513"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907516"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907523"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950101"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957616"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}