Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-54874

Опубликовано: 05 авг. 2025
Источник: debian
EPSS Низкий

Описание

OpenJPEG is an open-source JPEG 2000 codec. In OpenJPEG 2.5.3 and earlier, a call to opj_jp2_read_header may lead to OOB heap memory write when the data stream p_stream is too short and p_image is not initialized.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openjpeg2fixed2.5.3-2.1package
openjpeg2no-dsatrixiepackage
openjpeg2not-affectedbookwormpackage
openjpeg2not-affectedbullseyepackage

Примечания

  • https://github.com/uclouvain/openjpeg/pull/1573

  • Introduced with: https://github.com/uclouvain/openjpeg/commit/0f528e95788863608aa1772f5370659edf618793 (v2.5.1)

  • Fixed by: https://github.com/uclouvain/openjpeg/commit/f809b80c67717c152a5ad30bf06774f00da4fd2d (master)

  • https://securitylab.github.com/advisories/GHSL-2025-057_OpenCV/

EPSS

Процентиль: 3%
0.00017
Низкий

Связанные уязвимости

ubuntu
23 дня назад

OpenJPEG is an open-source JPEG 2000 codec. In OpenJPEG 2.5.3 and earlier, a call to opj_jp2_read_header may lead to OOB heap memory write when the data stream p_stream is too short and p_image is not initialized.

CVSS3: 8
redhat
23 дня назад

OpenJPEG is an open-source JPEG 2000 codec. In OpenJPEG 2.5.3 and earlier, a call to opj_jp2_read_header may lead to OOB heap memory write when the data stream p_stream is too short and p_image is not initialized.

nvd
23 дня назад

OpenJPEG is an open-source JPEG 2000 codec. In OpenJPEG 2.5.3 and earlier, a call to opj_jp2_read_header may lead to OOB heap memory write when the data stream p_stream is too short and p_image is not initialized.

oracle-oval
11 дней назад

ELSA-2025-13944: openjpeg2 security update (IMPORTANT)

EPSS

Процентиль: 3%
0.00017
Низкий