Red Hat 9062 Published by

An openjpeg2 security update has been released for Red Hat Enterprise Linux 8.



RHSA-2021:4251-04: Moderate: openjpeg2 security update



=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: openjpeg2 security update
Advisory ID: RHSA-2021:4251-01
Product: Red Hat Enterprise Linux
Advisory URL:   https://access.redhat.com/errata/RHSA-2021:4251
Issue date: 2021-11-09
CVE Names: CVE-2018-5727 CVE-2018-5785 CVE-2018-20845
CVE-2018-20847 CVE-2019-12973 CVE-2020-15389
CVE-2020-27814 CVE-2020-27823 CVE-2020-27824
CVE-2020-27842 CVE-2020-27843 CVE-2020-27845
CVE-2021-3575 CVE-2021-29338
=====================================================================

1. Summary:

An update for openjpeg2 is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux CRB (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

OpenJPEG is an open source library for reading and writing image files in
JPEG2000 format.

The following packages have been upgraded to a later upstream version:
openjpeg2 (2.4.0).

Security Fix(es):

* openjpeg: use-after-free and double-free via a mix of valid and invalid
files in a directory operated on by the decompressor (CVE-2020-15389)

* openjpeg: heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS
(CVE-2020-27814)

* openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode()
(CVE-2020-27823)

* openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary
code execution (CVE-2021-3575)

* openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c
(CVE-2018-5727)

* openjpeg: integer overflow in opj_j2k_setup_encoder function in
openjp2/j2k.c (CVE-2018-5785)

* openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and
pi_next_rpcl in openmj2/pi.c (CVE-2018-20845)

* openjpeg: integer overflow in function opj_get_encoding_parameters in
openjp2/pi.c (CVE-2018-20847)

* openjpeg: denial of service in function opj_t1_encode_cblks in
openjp2/t1.c (CVE-2019-12973)

* openjpeg: global-buffer-overflow read in
opj_dwt_calc_explicit_stepsizes() (CVE-2020-27824)

* openjpeg: null pointer dereference in opj_tgt_reset function in
lib/openjp2/tgt.c (CVE-2020-27842)

* openjpeg: out-of-bounds read in opj_t2_encode_packet function in
openjp2/t2.c (CVE-2020-27843)

* openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp,
opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (CVE-2020-27845)

* openjpeg: out-of-bounds write due to an integer overflow in
opj_compress.c (CVE-2021-29338)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.5 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

  https://access.redhat.com/articles/11258

5. Bugs fixed (  https://bugzilla.redhat.com/):

1536552 - CVE-2018-5727 openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c
1537758 - CVE-2018-5785 openjpeg: integer overflow in opj_j2k_setup_encoder function in openjp2/j2k.c
1728505 - CVE-2018-20845 openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c
1728509 - CVE-2018-20847 openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c
1732270 - CVE-2019-12973 openjpeg: denial of service in function opj_t1_encode_cblks in openjp2/t1.c
1852869 - CVE-2020-15389 openjpeg: use-after-free and double-free via a mix of valid and invalid files in a directory operated on by the decompressor
1901998 - CVE-2020-27814 openjpeg: heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS
1905723 - CVE-2020-27824 openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes()
1905762 - CVE-2020-27823 openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode()
1907513 - CVE-2020-27842 openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c
1907516 - CVE-2020-27843 openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c
1907523 - CVE-2020-27845 openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c
1950101 - CVE-2021-29338 openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c
1957616 - CVE-2021-3575 openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
openjpeg2-2.4.0-4.el8.src.rpm

aarch64:
openjpeg2-2.4.0-4.el8.aarch64.rpm
openjpeg2-debuginfo-2.4.0-4.el8.aarch64.rpm
openjpeg2-debugsource-2.4.0-4.el8.aarch64.rpm
openjpeg2-tools-2.4.0-4.el8.aarch64.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.aarch64.rpm

noarch:
openjpeg2-devel-docs-2.4.0-4.el8.noarch.rpm

ppc64le:
openjpeg2-2.4.0-4.el8.ppc64le.rpm
openjpeg2-debuginfo-2.4.0-4.el8.ppc64le.rpm
openjpeg2-debugsource-2.4.0-4.el8.ppc64le.rpm
openjpeg2-tools-2.4.0-4.el8.ppc64le.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.ppc64le.rpm

s390x:
openjpeg2-2.4.0-4.el8.s390x.rpm
openjpeg2-debuginfo-2.4.0-4.el8.s390x.rpm
openjpeg2-debugsource-2.4.0-4.el8.s390x.rpm
openjpeg2-tools-2.4.0-4.el8.s390x.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.s390x.rpm

x86_64:
openjpeg2-2.4.0-4.el8.i686.rpm
openjpeg2-2.4.0-4.el8.x86_64.rpm
openjpeg2-debuginfo-2.4.0-4.el8.i686.rpm
openjpeg2-debuginfo-2.4.0-4.el8.x86_64.rpm
openjpeg2-debugsource-2.4.0-4.el8.i686.rpm
openjpeg2-debugsource-2.4.0-4.el8.x86_64.rpm
openjpeg2-tools-2.4.0-4.el8.x86_64.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.i686.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.x86_64.rpm

Red Hat Enterprise Linux CRB (v. 8):

aarch64:
openjpeg2-debuginfo-2.4.0-4.el8.aarch64.rpm
openjpeg2-debugsource-2.4.0-4.el8.aarch64.rpm
openjpeg2-devel-2.4.0-4.el8.aarch64.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.aarch64.rpm

ppc64le:
openjpeg2-debuginfo-2.4.0-4.el8.ppc64le.rpm
openjpeg2-debugsource-2.4.0-4.el8.ppc64le.rpm
openjpeg2-devel-2.4.0-4.el8.ppc64le.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.ppc64le.rpm

s390x:
openjpeg2-debuginfo-2.4.0-4.el8.s390x.rpm
openjpeg2-debugsource-2.4.0-4.el8.s390x.rpm
openjpeg2-devel-2.4.0-4.el8.s390x.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.s390x.rpm

x86_64:
openjpeg2-debuginfo-2.4.0-4.el8.i686.rpm
openjpeg2-debuginfo-2.4.0-4.el8.x86_64.rpm
openjpeg2-debugsource-2.4.0-4.el8.i686.rpm
openjpeg2-debugsource-2.4.0-4.el8.x86_64.rpm
openjpeg2-devel-2.4.0-4.el8.i686.rpm
openjpeg2-devel-2.4.0-4.el8.x86_64.rpm
openjpeg2-tools-2.4.0-4.el8.i686.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.i686.rpm
openjpeg2-tools-debuginfo-2.4.0-4.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
  https://access.redhat.com/security/team/key/

7. References:

  https://access.redhat.com/security/cve/CVE-2018-5727
  https://access.redhat.com/security/cve/CVE-2018-5785
  https://access.redhat.com/security/cve/CVE-2018-20845
  https://access.redhat.com/security/cve/CVE-2018-20847
  https://access.redhat.com/security/cve/CVE-2019-12973
  https://access.redhat.com/security/cve/CVE-2020-15389
  https://access.redhat.com/security/cve/CVE-2020-27814
  https://access.redhat.com/security/cve/CVE-2020-27823
  https://access.redhat.com/security/cve/CVE-2020-27824
  https://access.redhat.com/security/cve/CVE-2020-27842
  https://access.redhat.com/security/cve/CVE-2020-27843
  https://access.redhat.com/security/cve/CVE-2020-27845
  https://access.redhat.com/security/cve/CVE-2021-3575
  https://access.redhat.com/security/cve/CVE-2021-29338
  https://access.redhat.com/security/updates/classification/#moderate
  https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/

8. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.