Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:7309

Опубликовано: 04 окт. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: openjpeg2 security update

OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.

Security Fix(es):

  • openjpeg: heap buffer overflow in bin/common/color.c (CVE-2024-56826)

  • openjpeg: heap buffer overflow in lib/openjp2/j2k.c (CVE-2024-56827)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
openjpeg2i6868.el9openjpeg2-2.4.0-8.el9.i686.rpm
openjpeg2x86_648.el9openjpeg2-2.4.0-8.el9.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 5.6
redos
10 месяцев назад

Множественные уязвимости openjpeg2

oracle-oval
7 месяцев назад

ELSA-2025-7309: openjpeg2 security update (MODERATE)

CVSS3: 5.6
ubuntu
11 месяцев назад

A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility. This can lead to an application crash or other undefined behavior.

CVSS3: 5.6
redhat
12 месяцев назад

A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility. This can lead to an application crash or other undefined behavior.

CVSS3: 5.6
nvd
11 месяцев назад

A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility. This can lead to an application crash or other undefined behavior.