Bug 1790511 (CVE-2020-6851) - CVE-2020-6851 openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor()
Summary: CVE-2020-6851 openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_proc...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-6851
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1790513 1790515 1790586 1790587 1790588 1790589 1790590 1790859 1790936
Blocks: 1790516
TreeView+ depends on / blocked
 
Reported: 2020-01-13 14:23 UTC by Marian Rehak
Modified: 2020-06-30 17:13 UTC (History)
17 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A heap-based buffer overflow flaw was found in openjpeg in the opj_t1_clbl_decode_processor in libopenjp2.so. Affecting versions through 2.3.1, the highest threat from this vulnerability is to file confidentiality and integrity as well as system availability.
Clone Of:
Environment:
Last Closed: 2020-01-28 20:09:29 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2020:0268 0 None None None 2020-01-28 18:34:10 UTC
Red Hat Product Errata RHBA-2020:0309 0 None None None 2020-01-30 17:45:55 UTC
Red Hat Product Errata RHSA-2020:0262 0 None None None 2020-01-28 14:44:47 UTC
Red Hat Product Errata RHSA-2020:0274 0 None None None 2020-01-29 09:53:05 UTC
Red Hat Product Errata RHSA-2020:0296 0 None None None 2020-01-30 10:04:19 UTC

Description Marian Rehak 2020-01-13 14:23:25 UTC
OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in libopenjp2.so.

Upstream Issue:

https://github.com/uclouvain/openjpeg/issues/1228

Comment 1 Marian Rehak 2020-01-13 14:23:55 UTC
Created mingw-openjpeg tracking bugs for this issue:

Affects: fedora-31 [bug 1790514]


Created openjpeg tracking bugs for this issue:

Affects: fedora-all [bug 1790512]


Created openjpeg2 tracking bugs for this issue:

Affects: epel-all [bug 1790515]
Affects: fedora-all [bug 1790513]

Comment 2 Huzaifa S. Sidhpurwala 2020-01-13 15:36:41 UTC
Upstream patch: https://github.com/uclouvain/openjpeg/commit/46c1eff9e98bbcf794d042f7b2e3d45556e805ce

Comment 7 Huzaifa S. Sidhpurwala 2020-01-14 12:05:37 UTC
Created openjpeg2 tracking bugs for this issue:

Affects: openstack-rdo [bug 1790859]

Comment 8 errata-xmlrpc 2020-01-28 14:44:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:0262 https://access.redhat.com/errata/RHSA-2020:0262

Comment 9 Product Security DevOps Team 2020-01-28 20:09:29 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-6851

Comment 10 errata-xmlrpc 2020-01-29 09:53:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:0274 https://access.redhat.com/errata/RHSA-2020:0274

Comment 11 errata-xmlrpc 2020-01-30 10:04:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:0296 https://access.redhat.com/errata/RHSA-2020:0296


Note You need to log in before you can comment on or make changes to this bug.