USN-7083-1: OpenJPEG vulnerabilities

Publication date

5 November 2024

Overview

Several security issues were fixed in OpenJPEG.


Packages

  • openjpeg2 - JPEG 2000 image compression/decompression library

Details

It was discovered that OpenJPEG incorrectly handled certain memory
operations when using the command line ”-ImgDir” in a directory with a
large number of files, leading to an integer overflow vulnerability. An
attacker could potentially use this issue to cause a denial of service.
This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2021-29338)

It was discovered that OpenJPEG incorrectly handled decompressing certain
.j2k files in sycc420_to_rgb, leading to a heap-based buffer overflow
vulnerability. If a user or automated system were tricked into opening
a specially crafted file, an attacker could possibly use this issue to
execute arbitrary code. (CVE-2021-3575)

It was discovered that OpenJPEG incorrectly handled certain memory
operations in the opj2_decompress program. An attacker could...

It was discovered that OpenJPEG incorrectly handled certain memory
operations when using the command line ”-ImgDir” in a directory with a
large number of files, leading to an integer overflow vulnerability. An
attacker could potentially use this issue to cause a denial of service.
This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2021-29338)

It was discovered that OpenJPEG incorrectly handled decompressing certain
.j2k files in sycc420_to_rgb, leading to a heap-based buffer overflow
vulnerability. If a user or automated system were tricked into opening
a specially crafted file, an attacker could possibly use this issue to
execute arbitrary code. (CVE-2021-3575)

It was discovered that OpenJPEG incorrectly handled certain memory
operations in the opj2_decompress program. An attacker could potentially
use this issue to cause a denial of service. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-1122)


Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
24.10 oracular libopenjp2-7 –  2.5.0-2ubuntu1.1
libopenjpip7 –  2.5.0-2ubuntu1.1
24.04 noble libopenjp2-7 –  2.5.0-2ubuntu0.2
libopenjpip7 –  2.5.0-2ubuntu0.2
22.04 jammy libopenjp2-7 –  2.4.0-6ubuntu0.2
libopenjp3d7 –  2.4.0-6ubuntu0.2
libopenjpip7 –  2.4.0-6ubuntu0.2
20.04 focal libopenjp2-7 –  2.3.1-1ubuntu4.20.04.3
libopenjp3d7 –  2.3.1-1ubuntu4.20.04.3
libopenjpip7 –  2.3.1-1ubuntu4.20.04.3
18.04 bionic libopenjp2-7 –  2.3.0-2+deb10u2ubuntu0.1~esm3  
libopenjp3d7 –  2.3.0-2+deb10u2ubuntu0.1~esm3  
libopenjpip7 –  2.3.0-2+deb10u2ubuntu0.1~esm3  
16.04 xenial libopenjp2-7 –  2.1.2-1.1+deb9u6ubuntu0.1~esm6  
libopenjp3d7 –  2.1.2-1.1+deb9u6ubuntu0.1~esm6  
libopenjpip7 –  2.1.2-1.1+deb9u6ubuntu0.1~esm6  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›