CVE-2021-3575

Name
CVE-2021-3575
Description
A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1957616
Exploit https://github.com/uclouvain/openjpeg/issues/1347
Third Party Advisory https://ubuntu.com/security/CVE-2021-3575
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:* openjpeg >= None <= 2.4.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openjpeg 3.15-main 2.4.0-r2 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
openjpeg 3.14-main 2.4.0-r1 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
openjpeg 3.13-main 2.4.0-r1 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
openjpeg 3.12-main 2.4.0-r1 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
openjpeg 3.16-main 2.5.0-r0 Francesco Colista <fcolista@alpinelinux.org> fixed
openjpeg 3.17-main 2.5.0-r0 Francesco Colista <fcolista@alpinelinux.org> fixed