Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-1122

Опубликовано: 29 мар. 2022
Источник: debian
EPSS Низкий

Описание

A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openjpeg2fixed2.5.0-1package
openjpeg2no-dsabusterpackage

Примечания

  • https://github.com/uclouvain/openjpeg/issues/1368

  • https://github.com/uclouvain/openjpeg/commit/0afbdcf3e6d0d2bd2e16a0c4d513ee3cf86e460d

EPSS

Процентиль: 15%
0.00048
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 3 лет назад

A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.

CVSS3: 5.1
redhat
почти 4 года назад

A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.

CVSS3: 5.5
nvd
около 3 лет назад

A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.

rocky
больше 2 лет назад

Low: openjpeg2 security update

rocky
больше 2 лет назад

Low: openjpeg2 security update

EPSS

Процентиль: 15%
0.00048
Низкий