Alpaquita Linux
Security Advisory

CVE-2020-15389

Published: August 31, 2023Last modified: August 31, 2023

Description

jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice.

Severity score breakdown

ParameterValue
Base score6.5
Attack VectorNETWORK
Attack complexityHIGH
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityLOW
Integrity impactNONE
Availability impactHIGH
VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSopenjpegNot affected (2.5.0-r0)
StreamopenjpegNot affected (2.5.0-r3)

References

ON THIS PAGE