Your submission was sent successfully! Close

CVE-2018-5727

Published: 16 January 2018

In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.

From the Ubuntu security team

It was discovered that OpenJPEG incorrectly handled certain BMP files. A remote attacker could possibly use this issue to cause a denial of service.

Priority

Negligible

CVSS 3 base score: 6.5

Status

Package Release Status
ghostscript
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri) Not vulnerable
(uses system openjpeg2)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(uses system openjpeg2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(uses system openjpeg2)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (9.26~dfsg+0-0ubuntu0.18.04.14)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (9.26~dfsg+0-0ubuntu0.16.04.14)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

openjpeg
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri) Does not exist

Ubuntu 21.04 (Hirsute Hippo) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr) Needs triage

openjpeg2
Launchpad, Ubuntu, Debian
Upstream
Released (2.3.1)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(2.3.1-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(2.3.1-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.3.1-1)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://github.com/uclouvain/openjpeg/pull/1187