|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-39329: openjpeg,openjpeg2: Resource exhaustion will occur in the opj_t1_decode_cblks function in the tcd.c | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | package coldpool <coldpool> |
| Status: | NEW --- | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | abergmann, mvetter, pgajdos |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/412865/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-39329:6.5:(AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: |
Reproducer 1
Reproducer 2 |
||
|
Description
SMASH SMASH
2024-07-05 07:41:57 UTC
Created attachment 875902 [details]
Reproducer 1
$ opj_decompress -i CVE-2023-39329.poc1 -o te.raw
And check memory allocation.
Created attachment 875903 [details]
Reproducer 2
$ opj_decompress -i CVE-2023-39329.poc2 -o te.raw
And check memory allocation.
opj_decompress is not part of openjpeg 1.5.2. Tried j2k_dump and j2k_to_image, was not successful. :/227425 # j2k_dump -i CVE-2023-39329.poc1.j2k -o te.raw [ERROR] Prevent buffer overflow (x1: 16770048, y1: 256) [ERROR] 0000002a: expected a marker instead of 8301 ERROR -> j2k_to_image: failed to decode image! :/227425 # j2k_dump -i CVE-2023-39329.poc2.j2k -o te.raw [ERROR] Prevent buffer overflow (x1: 256, y1: 16777472) [ERROR] 0000002a: expected a marker instead of 8301 ERROR -> j2k_to_image: failed to decode image! :/227425 # Tried with openjpeg 2.5.2 (openSUSE.org:home:pgajdos/openjpeg) and it is easily reproducible, indeed: :/227425 # opj_decompress -i CVE-2023-39329.poc1 -o te.raw =========================================== The extension of this file is incorrect. FOUND poc1. SHOULD BE .j2k or .jpc or .j2c or .jhc =========================================== [INFO] Start to read j2k main header (0). [WARNING] Unknown marker [WARNING] Unknown marker [WARNING] Unknown marker [INFO] Main header has been correctly decoded. [INFO] No decoded area parameters, set the decoded area to the whole image [INFO] Psot value of the current tile-part is equal to zero, we assuming it is the last tile-part of the codestream. [INFO] Header of tile 1 / 2 has been read. [ERROR] opj_pi_next_lrcp(): invalid compno0/compno1 [ERROR] opj_pi_next_lrcp(): invalid compno0/compno1 ^C :/227425 # Similar to CVE-2023-39329.poc1. (In reply to Petr Gajdos from comment #4) > Similar to CVE-2023-39329.poc1. > Similarly to CVE-2023-39329.poc2. I think openjpeg 1.5.2 can be affected, still. I guess we should wait for upstream fix to confirm. |