Bug 1901998 (CVE-2020-27814)

Summary: CVE-2020-27814 openjpeg: heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS
Product: [Other] Security Response Reporter: Michael Kaplan <mkaplan>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jaromir.capik, manisandro, nforro, oliver, rdieter
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: openjpeg 2.4.0 Doc Type: If docs needed, set a value
Doc Text:
A heap-buffer overflow was found in the way openjpeg2 handled certain PNG format files. An attacker could use this flaw to cause an application crash or in some cases execute arbitrary code with the permission of the user running such an application.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-11-09 17:52:30 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1901999, 1902000, 1902001, 1908965, 1908966    
Bug Blocks: 1902002    

Description Michael Kaplan 2020-11-26 15:01:35 UTC
A heap-buffer overwrites error was discovered in lib/openjp2/mqc.c in
OpenJPEG 2.3.1. The vulnerability causes an out-of-bounds write, which may
lead to remote denial of service or possibly remote code execution.

Comment 2 Michael Kaplan 2020-11-26 15:02:02 UTC
Created mingw-openjpeg2 tracking bugs for this issue:

Affects: fedora-all [bug 1902001]


Created openjpeg2 tracking bugs for this issue:

Affects: epel-all [bug 1901999]
Affects: fedora-all [bug 1902000]

Comment 4 Michael Kaplan 2020-11-27 13:36:33 UTC
Acknowledgments:

Name: zodf0055980 (SQLab NCTU Taiwan)

Comment 5 Michael Kaplan 2020-11-27 15:54:00 UTC
External References:

https://github.com/uclouvain/openjpeg/issues/1283

Comment 8 Product Security DevOps Team 2021-11-09 17:52:28 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-27814

Comment 9 errata-xmlrpc 2021-11-09 17:56:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:4251 https://access.redhat.com/errata/RHSA-2021:4251