Your submission was sent successfully! Close

CVE-2018-16375

Published: 03 September 2018

An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow.

From the Ubuntu security team

It was discovered that OpenJPEG incorrectly handled certain PNM files. A remote attacker could possibly use this issue to cause a denial of service.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
openjpeg2
Launchpad, Ubuntu, Debian
Upstream
Released (2.3.1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.3.1-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(code not compiled)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(code not compiled)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://github.com/uclouvain/openjpeg/commit/619e1b086eaa21ebd9b23eb67deee543b07bf06f

Notes

AuthorNote
mdeslaur
Ubuntu packages are built with -DBUILD_JPWL:BOOL=OFF, so the
vulnerable code isn't compiled

References