Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-54874

Опубликовано: 05 авг. 2025
Источник: debian
EPSS Низкий

Описание

OpenJPEG is an open-source JPEG 2000 codec. In OpenJPEG from 2.5.1 through 2.5.3, a call to opj_jp2_read_header may lead to OOB heap memory write when the data stream p_stream is too short and p_image is not initialized.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openjpeg2fixed2.5.3-2.1package
openjpeg2fixed2.5.3-2.1~deb13u1trixiepackage
openjpeg2not-affectedbookwormpackage
openjpeg2not-affectedbullseyepackage

Примечания

  • https://github.com/uclouvain/openjpeg/pull/1573

  • Introduced with: https://github.com/uclouvain/openjpeg/commit/0f528e95788863608aa1772f5370659edf618793 (v2.5.1)

  • Fixed by: https://github.com/uclouvain/openjpeg/commit/f809b80c67717c152a5ad30bf06774f00da4fd2d (master)

  • https://securitylab.github.com/advisories/GHSL-2025-057_OpenCV/

EPSS

Процентиль: 17%
0.00053
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
3 месяца назад

OpenJPEG is an open-source JPEG 2000 codec. In OpenJPEG from 2.5.1 through 2.5.3, a call to opj_jp2_read_header may lead to OOB heap memory write when the data stream p_stream is too short and p_image is not initialized.

CVSS3: 8
redhat
3 месяца назад

OpenJPEG is an open-source JPEG 2000 codec. In OpenJPEG 2.5.3 and earlier, a call to opj_jp2_read_header may lead to OOB heap memory write when the data stream p_stream is too short and p_image is not initialized.

CVSS3: 9.8
nvd
3 месяца назад

OpenJPEG is an open-source JPEG 2000 codec. In OpenJPEG from 2.5.1 through 2.5.3, a call to opj_jp2_read_header may lead to OOB heap memory write when the data stream p_stream is too short and p_image is not initialized.

rocky
около 1 месяца назад

Important: openjpeg2 security update

oracle-oval
3 месяца назад

ELSA-2025-13944: openjpeg2 security update (IMPORTANT)

EPSS

Процентиль: 17%
0.00053
Низкий