Bug 1180042 - (CVE-2020-27841) VUL-1: CVE-2020-27841: openjpeg,openjpeg2,ghostscript: buffer over-read in lib/openjp2/pi.c
VUL-1: CVE-2020-27841: openjpeg,openjpeg2,ghostscript: buffer over-read in li...
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
Other Other
: P4 - Low : Minor
: ---
Assigned To: Johannes Meixner
Security Team bot
Depends on:
  Show dependency treegraph
Reported: 2020-12-15 09:46 UTC by Wolfgang Frisch
Modified: 2022-01-14 11:11 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Wolfgang Frisch 2020-12-15 09:46:26 UTC

A flaw was found in OpenJPEG. Specially crafted files can lead to multiple heap-based buffer overflows in lib/openjp2/pi.c.

Comment 1 Wolfgang Frisch 2020-12-15 16:01:33 UTC
I did a git bisect and the earliest vulnerable commit is:

commit 84f3bebbff515f2b00ccf0c817930ebb10b91760 (refs/bisect/bad)
Author: Even Rouault <even.rouault@spatialys.com>
Date:   Wed Feb 12 15:55:16 2020 +0100

    Implement writing of IMF profiles

    Add -IMF switch to opj_compress as well

None of the PoCs triggers a buffer over-read without -IMF.

SUSE:SLE-12:Update      ghostscript          Affected [2]
SUSE:SLE-12-SP2:Update  openjpeg2            Not affected [1]
SUSE:SLE-15:Update      ghostscript          Affected [2]
SUSE:SLE-15:Update      openjpeg             Not affected [1]
SUSE:SLE-15:Update      openjpeg2            Affected [2]

[1] Not reproducible. No IMF support.
[2] Not reproducible. No IMF support. Upstream patch applies.

Please double-check.
Comment 2 Gabriele Sonnu 2022-01-12 09:27:13 UTC
Hi, any update on this?