Vulnerability Description
A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Uclouvain | Openjpeg | <= 2.4.0 |
| Redhat | Enterprise Linux | 6.0 |
| Fedoraproject | Fedora | 33 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1957616Issue TrackingThird Party Advisory
- https://github.com/uclouvain/openjpeg/issues/1347ExploitIssue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://ubuntu.com/security/CVE-2021-3575Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1957616Issue TrackingThird Party Advisory
- https://github.com/uclouvain/openjpeg/issues/1347ExploitIssue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2025/04/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://ubuntu.com/security/CVE-2021-3575Third Party Advisory
FAQ
What is CVE-2021-3575?
CVE-2021-3575 is a vulnerability with a CVSS score of 7.8 (HIGH). A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions...
How severe is CVE-2021-3575?
CVE-2021-3575 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3575?
Check the references section above for vendor advisories and patch information. Affected products include: Uclouvain Openjpeg, Redhat Enterprise Linux, Fedoraproject Fedora.