Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in OpenJPEG
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in OpenJPEG
ID: USN-7223-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10
Datum: Fr, 24. Januar 2025, 06:46
Referenzen: https://launchpad.net/ubuntu/+source/openjpeg2/2.3.1-1ubuntu4.20.04.4
https://www.cve.org/CVERecord?id=CVE-2024-56826
https://www.cve.org/CVERecord?id=CVE-2024-56827
Applikationen: OpenJPEG

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6089472872065633438==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------McFza8TK0QHTzcjdiB0IwIkq"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------McFza8TK0QHTzcjdiB0IwIkq
Content-Type: multipart/mixed;
boundary="------------MiuyAhLOrCG8x8GpMS0cNp7T";
protected-headers="v1"
From: Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>
Reply-To: security@ubuntu.com
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <41a0f542-4648-4caf-91f1-e97981154d8d@canonical.com>
Subject: [USN-7223-1] OpenJPEG vulnerabilities

--------------MiuyAhLOrCG8x8GpMS0cNp7T
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7223-1
January 22, 2025

openjpeg2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

OpenJPEG could be made to crash or run programs if it opened a specially
crafted file.

Software Description:
- openjpeg2: JPEG 2000 image compression/decompression library

Details:

Frank Zeng discovered that OpenJPEG incorrectly handled memory when using
the decompression utility. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2024-56826,
CVE-2024-56827)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
  libopenjp2-7                    2.5.0-2ubuntu1.2
  libopenjp2-tools                2.5.0-2ubuntu1.2

Ubuntu 24.04 LTS
  libopenjp2-7                    2.5.0-2ubuntu0.3
  libopenjp2-tools                2.5.0-2ubuntu0.3

Ubuntu 22.04 LTS
  libopenjp2-7                    2.4.0-6ubuntu0.3
  libopenjp2-tools                2.4.0-6ubuntu0.3
  libopenjp3d-tools               2.4.0-6ubuntu0.3
  libopenjp3d7                    2.4.0-6ubuntu0.3

Ubuntu 20.04 LTS
  libopenjp2-7                    2.3.1-1ubuntu4.20.04.4
  libopenjp2-tools                2.3.1-1ubuntu4.20.04.4
  libopenjp3d-tools               2.3.1-1ubuntu4.20.04.4
  libopenjp3d7                    2.3.1-1ubuntu4.20.04.4

Ubuntu 18.04 LTS
  libopenjp2-7                    2.3.0-2+deb10u2ubuntu0.1~esm4
                                  Available with Ubuntu Pro
  libopenjp2-tools                2.3.0-2+deb10u2ubuntu0.1~esm4
                                  Available with Ubuntu Pro
  libopenjp3d-tools               2.3.0-2+deb10u2ubuntu0.1~esm4
                                  Available with Ubuntu Pro
  libopenjp3d7                    2.3.0-2+deb10u2ubuntu0.1~esm4
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  libopenjp2-7                    2.1.2-1.1+deb9u6ubuntu0.1~esm7
                                  Available with Ubuntu Pro
  libopenjp2-tools                2.1.2-1.1+deb9u6ubuntu0.1~esm7
                                  Available with Ubuntu Pro
  libopenjp3d-tools               2.1.2-1.1+deb9u6ubuntu0.1~esm7
                                  Available with Ubuntu Pro
  libopenjp3d7                    2.1.2-1.1+deb9u6ubuntu0.1~esm7
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7223-1
  CVE-2024-56826, CVE-2024-56827

Package Information:
  https://launchpad.net/ubuntu/+source/openjpeg2/2.5.0-2ubuntu1.2
  https://launchpad.net/ubuntu/+source/openjpeg2/2.5.0-2ubuntu0.3
  https://launchpad.net/ubuntu/+source/openjpeg2/2.4.0-6ubuntu0.3
https://launchpad.net/ubuntu/+source/openjpeg2/2.3.1-1ubuntu4.20.04.4

--------------MiuyAhLOrCG8x8GpMS0cNp7T--

--------------McFza8TK0QHTzcjdiB0IwIkq
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----

wsF5BAABCAAjFiEELOLXZEFYQHcSWEHiyfW2m9Ldu6sFAmeSOpkFAwAAAAAACgkQyfW2m9Ldu6sO
hQ//bDuGCZkekt/RmMPsJAvEp0EXEWyVKJFPDvfFNTpGp4duUIuhlCOSaEccxlQ4biaj0r+7Lbnz
LV8sfW5kwagTHxtFBGhxHKveFZm9J+cnAQIyG0ddOIXQYUiCFe2zORNAdXtJHacfVLz8o11MhdBD
a6BLvHOmTBTr1mFTO90fFEuJ9YJRKIY4TP42rWrHlIdH2oGv1meLlypnkUV6l/2zMpzne6noSEs/
4FJ04dPS9fAxp87RGwsSYptsxUcKTrM6BghH685c6/GCcFlcwafyrqhxaQQH0x9hPGogjFDIOsZk
YLOMQbLj3/5UvGTstTmy7dQolvrmp2aUbQc8/oJDYr4cIFOShutNOK4QrBFbjW2CrlVWR54uHZxo
2n3A9TD86/+ah6LZjbPl3Y2Zh1Gq+08yQA8Y3iTELZqwrCHt5dHxXwo8FXY8I75B0RfB3Joj4aon
C2jdzGSFAVZM60qX3GIMmMnxrqAUxkre6twcwWVeR5E4SRNpZB1L9466qMG6B/VIUqNu8c6AxLDG
AiFvCLq8c00YGFVKSbyBFVKmTZ6K8Xh2NlijJ9nkSy7E7vXS/YvLct5uD8d1qD7r6V2pD9pi89ZM
aFhWa7ZvQQac1twAjSq6DVFJyMWViVgtVVYC/8tKQ+JXj/X4FfsrMLMmK4FQ/30jouC4UxRWXhw7
Uw0=
=bqJA
-----END PGP SIGNATURE-----

--------------McFza8TK0QHTzcjdiB0IwIkq--


--===============6089472872065633438==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============6089472872065633438==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung