Severity
6.5MEDIUM
EPSS
0.3%
top 42.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 29
Latest updateMar 15

Description

jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:HExploitability: 2.2 | Impact: 4.2

Affected Packages4 packages

Debianopenjpeg2< 2.4.0-1+3
Ubuntuopenjpeg2< 2.1.2-1.1+deb9u5build0.16.04.1
NVDoracle/outside_in_technology8.5.4, 8.5.5+1

Also affects: Debian Linux 10.0, 9.0

Patches

🔴Vulnerability Details

5
OSV
openjpeg2 vulnerabilities2023-03-15
GHSA
GHSA-7fhh-p939-wc2j: jp2/opj_decompress2022-05-24
OSV
OpenJPEG vulnerabilities2020-09-15
CVEList
CVE-2020-15389: jp2/opj_decompress2020-06-29
OSV
CVE-2020-15389: jp2/opj_decompress2020-06-29

📋Vendor Advisories

6
Ubuntu
OpenJPEG vulnerabilities2023-03-15
Ubuntu
OpenJPEG vulnerabilities2021-01-07
Oracle
Oracle Oracle Fusion Middleware Risk Matrix: Installation (OpenJPEG) — CVE-2020-153892020-10-15
Ubuntu
OpenJPEG vulnerabilities2020-09-15
Red Hat
openjpeg: use-after-free and double-free via a mix of valid and invalid files in a directory operated on by the decompressor2020-06-28

💬Community

3
Bugzilla
CVE-2020-15389 openjpeg: use-after-free and double-free via a mix of valid and invalid files in a directory operated on by the decompressor [fedora-all]2020-07-01
Bugzilla
CVE-2020-15389 openjpeg: use-after-free and double-free via a mix of valid and invalid files in a directory operated on by the decompressor2020-07-01
Bugzilla
CVE-2020-15389 openjpeg2: openjpeg: use-after-free and double-free via a mix of valid and invalid files in a directory operated on by the decompressor [epel-all]2020-07-01
CVE-2020-15389 (MEDIUM CVSS 6.5) | jp2/opj_decompress.c in OpenJPEG th | cvebase.io