-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: openjpeg2 security update Advisory ID: RHSA-2021:4251-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:4251 Issue date: 2021-11-09 CVE Names: CVE-2018-5727 CVE-2018-5785 CVE-2018-20845 CVE-2018-20847 CVE-2019-12973 CVE-2020-15389 CVE-2020-27814 CVE-2020-27823 CVE-2020-27824 CVE-2020-27842 CVE-2020-27843 CVE-2020-27845 CVE-2021-3575 CVE-2021-29338 =====================================================================
1. Summary:
An update for openjpeg2 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 Red Hat Enterprise Linux CRB (v. 8) - aarch64, ppc64le, s390x, x86_64
3. Description:
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
The following packages have been upgraded to a later upstream version: openjpeg2 (2.4.0).
Security Fix(es):
* openjpeg: use-after-free and double-free via a mix of valid and invalid files in a directory operated on by the decompressor (CVE-2020-15389)
* openjpeg: heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS (CVE-2020-27814)
* openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode() (CVE-2020-27823)
* openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution (CVE-2021-3575)
* openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c (CVE-2018-5727)
* openjpeg: integer overflow in opj_j2k_setup_encoder function in openjp2/j2k.c (CVE-2018-5785)
* openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c (CVE-2018-20845)
* openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c (CVE-2018-20847)
* openjpeg: denial of service in function opj_t1_encode_cblks in openjp2/t1.c (CVE-2019-12973)
* openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes() (CVE-2020-27824)
* openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c (CVE-2020-27842)
* openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c (CVE-2020-27843)
* openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (CVE-2020-27845)
* openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c (CVE-2021-29338)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.
4. Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1536552 - CVE-2018-5727 openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c 1537758 - CVE-2018-5785 openjpeg: integer overflow in opj_j2k_setup_encoder function in openjp2/j2k.c 1728505 - CVE-2018-20845 openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c 1728509 - CVE-2018-20847 openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c 1732270 - CVE-2019-12973 openjpeg: denial of service in function opj_t1_encode_cblks in openjp2/t1.c 1852869 - CVE-2020-15389 openjpeg: use-after-free and double-free via a mix of valid and invalid files in a directory operated on by the decompressor 1901998 - CVE-2020-27814 openjpeg: heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS 1905723 - CVE-2020-27824 openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes() 1905762 - CVE-2020-27823 openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode() 1907513 - CVE-2020-27842 openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c 1907516 - CVE-2020-27843 openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c 1907523 - CVE-2020-27845 openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c 1950101 - CVE-2021-29338 openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c 1957616 - CVE-2021-3575 openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution
6. Package List:
Red Hat Enterprise Linux AppStream (v. 8):
Source: openjpeg2-2.4.0-4.el8.src.rpm
aarch64: openjpeg2-2.4.0-4.el8.aarch64.rpm openjpeg2-debuginfo-2.4.0-4.el8.aarch64.rpm openjpeg2-debugsource-2.4.0-4.el8.aarch64.rpm openjpeg2-tools-2.4.0-4.el8.aarch64.rpm openjpeg2-tools-debuginfo-2.4.0-4.el8.aarch64.rpm
noarch: openjpeg2-devel-docs-2.4.0-4.el8.noarch.rpm
ppc64le: openjpeg2-2.4.0-4.el8.ppc64le.rpm openjpeg2-debuginfo-2.4.0-4.el8.ppc64le.rpm openjpeg2-debugsource-2.4.0-4.el8.ppc64le.rpm openjpeg2-tools-2.4.0-4.el8.ppc64le.rpm openjpeg2-tools-debuginfo-2.4.0-4.el8.ppc64le.rpm
s390x: openjpeg2-2.4.0-4.el8.s390x.rpm openjpeg2-debuginfo-2.4.0-4.el8.s390x.rpm openjpeg2-debugsource-2.4.0-4.el8.s390x.rpm openjpeg2-tools-2.4.0-4.el8.s390x.rpm openjpeg2-tools-debuginfo-2.4.0-4.el8.s390x.rpm
x86_64: openjpeg2-2.4.0-4.el8.i686.rpm openjpeg2-2.4.0-4.el8.x86_64.rpm openjpeg2-debuginfo-2.4.0-4.el8.i686.rpm openjpeg2-debuginfo-2.4.0-4.el8.x86_64.rpm openjpeg2-debugsource-2.4.0-4.el8.i686.rpm openjpeg2-debugsource-2.4.0-4.el8.x86_64.rpm openjpeg2-tools-2.4.0-4.el8.x86_64.rpm openjpeg2-tools-debuginfo-2.4.0-4.el8.i686.rpm openjpeg2-tools-debuginfo-2.4.0-4.el8.x86_64.rpm
Red Hat Enterprise Linux CRB (v. 8):
aarch64: openjpeg2-debuginfo-2.4.0-4.el8.aarch64.rpm openjpeg2-debugsource-2.4.0-4.el8.aarch64.rpm openjpeg2-devel-2.4.0-4.el8.aarch64.rpm openjpeg2-tools-debuginfo-2.4.0-4.el8.aarch64.rpm
ppc64le: openjpeg2-debuginfo-2.4.0-4.el8.ppc64le.rpm openjpeg2-debugsource-2.4.0-4.el8.ppc64le.rpm openjpeg2-devel-2.4.0-4.el8.ppc64le.rpm openjpeg2-tools-debuginfo-2.4.0-4.el8.ppc64le.rpm
s390x: openjpeg2-debuginfo-2.4.0-4.el8.s390x.rpm openjpeg2-debugsource-2.4.0-4.el8.s390x.rpm openjpeg2-devel-2.4.0-4.el8.s390x.rpm openjpeg2-tools-debuginfo-2.4.0-4.el8.s390x.rpm
x86_64: openjpeg2-debuginfo-2.4.0-4.el8.i686.rpm openjpeg2-debuginfo-2.4.0-4.el8.x86_64.rpm openjpeg2-debugsource-2.4.0-4.el8.i686.rpm openjpeg2-debugsource-2.4.0-4.el8.x86_64.rpm openjpeg2-devel-2.4.0-4.el8.i686.rpm openjpeg2-devel-2.4.0-4.el8.x86_64.rpm openjpeg2-tools-2.4.0-4.el8.i686.rpm openjpeg2-tools-debuginfo-2.4.0-4.el8.i686.rpm openjpeg2-tools-debuginfo-2.4.0-4.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2018-5727 https://access.redhat.com/security/cve/CVE-2018-5785 https://access.redhat.com/security/cve/CVE-2018-20845 https://access.redhat.com/security/cve/CVE-2018-20847 https://access.redhat.com/security/cve/CVE-2019-12973 https://access.redhat.com/security/cve/CVE-2020-15389 https://access.redhat.com/security/cve/CVE-2020-27814 https://access.redhat.com/security/cve/CVE-2020-27823 https://access.redhat.com/security/cve/CVE-2020-27824 https://access.redhat.com/security/cve/CVE-2020-27842 https://access.redhat.com/security/cve/CVE-2020-27843 https://access.redhat.com/security/cve/CVE-2020-27845 https://access.redhat.com/security/cve/CVE-2021-3575 https://access.redhat.com/security/cve/CVE-2021-29338 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYYrdsdzjgjWX9erEAQhigw//YMH0qGWY0NRaqpWG5R/qfrKxxHNEPRFi sgppCLbFMI59HgzVrDzCkrPM4nz1duNzZrAPCZtwl57ZgZS6X4NDJXZ9Kyf5hed8 QuRhCZP0MilEmcuLcCBhJaKbsYTRNiAYg66MnPaRfNq4SIhBabMXLbosgMcHpfrr dWfoQSRJG+SS8z1wRKwaxi6QbsQq0XLP38yGz0j62rKW7cNUsFKhDfNntivZUXuN 2y7RzRK12ubt4TsQRCQFOGyUVuPBNWWYQxjaYmgHz/mpJGOlNFKns95gP5ExTwgw xp7NBAQ726WjcsbqGPH6G8mqSEw62BSOYhv/p2srEjdNI24+0GLYFSnruab8qXBq HbpWFKcWHN/biOJqNKGlzMCW7iCgOWmulvhWBecHPU+pg2DFv534CsxegNNXsOm+ 7bC9YmU89Ei4wxp5hrBkucbF0sKHS0DEjavJM8pExG+12wI6xIoE+SCvK/Gatjhz 8vAywTyyyMpoxjLy9nMZlXser++OHEv1D9xAWX8rk/PnHbih8gqQpS2+6za32UEj Pfq3KzgW1fNap7q79D/wp5ToSmt+8cpnExC2RWRixmR6mdTYSOQcj5eaxzJQfOv/ EwnNqptfrP9CgW1z/mG/sa3KPmH8M1Gd4LTIBHp7PzldW96MjTN8VPNd7a9wtihE VzgzQOVJZ3E= =QXPl -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
|