-
Notifications
You must be signed in to change notification settings - Fork 467
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
heap-buffer-overflow at lib/openjp2/j2k.c:8460:84 in opj_j2k_add_tlmarker in openjpeg/opj_decompress #1564
Comments
rouault
added a commit
to rouault/openjpeg
that referenced
this issue
Nov 25, 2024
…ller that total number of tile-parts Fixes uclouvain#1564
rouault
added a commit
to rouault/openjpeg
that referenced
this issue
Nov 25, 2024
…ller that total number of tile-parts Fixes uclouvain#1564
github-actions bot
pushed a commit
to Boeing/meta-openembedded-contrib
that referenced
this issue
Jan 23, 2025
CVE-2024-56827: A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility. This can lead to an application crash or other undefined behavior. Reference: [https://nvd.nist.gov/vuln/detail/CVE-2024-56827] [uclouvain/openjpeg#1564] Upstream patches: [uclouvain/openjpeg@e492644] Signed-off-by: Zhang Peng <[email protected]> Signed-off-by: Armin Kuster <[email protected]>
jpuhlman
pushed a commit
to MontaVista-OpenSourceTechnology/meta-openembedded
that referenced
this issue
Jan 27, 2025
Source: meta-openembedded MR: 171655, 170728 Type: Security Fix Disposition: Merged from meta-openembedded ChangeID: 291fc3e Description: CVE-2024-56827: A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility. This can lead to an application crash or other undefined behavior. Reference: [https://nvd.nist.gov/vuln/detail/CVE-2024-56827] [uclouvain/openjpeg#1564] Upstream patches: [uclouvain/openjpeg@e492644] Signed-off-by: Zhang Peng <[email protected]> Signed-off-by: Armin Kuster <[email protected]> Signed-off-by: Jeremy A. Puhlman <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
Dear developers,
We found the following heap buffer overflow bug on openjpeg, please confirm.
This bug is triggered when we use opj_decompress with the -t option and its argument set to 1.
The latest version v2.5.2 also has this vulnerability.
Version
# ./bin/opj_decompress -h This is the opj_decompress utility from the OpenJPEG project. It decompresses JPEG 2000 codestreams to various image formats. It has been compiled against openjp2 library v2.5.2.
Reproduction
ASAN Log
./bin/opj_decompress -i poc2openjpeg -o tmp.pnm -t 1
PoC
poc2openjpeg: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc2openjpeg
Reference
https://github.com/uclouvain/openjpeg
Environment
Thanks for your time!
The text was updated successfully, but these errors were encountered: