CVE-2020-15389
Publication date 29 June 2020
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice.
From the Ubuntu Security Team
It was discovered that OpenJPEG did not properly handle certain input. If OpenJPEG were supplied with specially crafted input, it could be made to crash or possibly execute arbitrary code.
Status
Package | Ubuntu Release | Status |
---|---|---|
ghostscript | ||
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
openjpeg | ||
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
openjpeg2 | ||
22.04 LTS jammy |
Fixed 2.3.1-1ubuntu5
|
|
20.04 LTS focal |
Fixed 2.3.1-1ubuntu4.20.04.1
|
|
18.04 LTS bionic |
Fixed 2.3.0-2+deb10u2build0.18.04.1
|
|
16.04 LTS xenial |
Fixed 2.1.2-1.1+deb9u5build0.16.04.1
|
|
14.04 LTS trusty | Not in release |
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4685-1
- OpenJPEG vulnerabilities
- 7 January 2021
- USN-4497-1
- OpenJPEG vulnerabilities
- 15 September 2020
- USN-5952-1
- OpenJPEG vulnerabilities
- 15 March 2023