Bug 1907510 (CVE-2020-27841)
Summary: | CVE-2020-27841 openjpeg: heap-based buffer overflows in lib/openjp2/pi.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | hobbes1069, jaromir.capik, manisandro, nforro, oliver, rdieter |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openjpeg 2.4.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in OpenJPEG in src/lib/openjp2/pi.c. This flaw allows an attacker who can provide crafted input to be processed by the OpenJPEG encoder to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-12-16 04:18:14 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1907672, 1907673, 1907674, 1907675 | ||
Bug Blocks: | 1906158, 1907565 |
Description
Guilherme de Almeida Suckevicz
2020-12-14 16:31:40 UTC
Acknowledgments: Name: zodf0055980 (SQLab NCTU Taiwan) Created mingw-openjpeg2 tracking bugs for this issue: Affects: fedora-all [bug 1907675] Created openjpeg tracking bugs for this issue: Affects: fedora-all [bug 1907673] Created openjpeg2 tracking bugs for this issue: Affects: epel-7 [bug 1907672] Affects: fedora-all [bug 1907674] Upstream commit: https://github.com/rouault/openjpeg/commit/00383e162ae2f8fc951f5745bf1011771acb8dce Statement: This issue does not affect openjpeg2 as shipped with Red Hat Enterprise Linux 8 because the affected functionality was introduced in the current master but is absent from the shipped release. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-27841 Mitigation: This flaw could be mitigated if OpenJPEG is not used for converting or encoding images, or untrusted input is not provided for these functions. |