UBUNTU-CVE-2019-6988

Source
https://ubuntu.com/security/CVE-2019-6988
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-6988.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2019-6988
Upstream
Published
2019-01-28T16:29:00Z
Modified
2026-04-22T12:21:37.199424Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

An issue was discovered in OpenJPEG 2.3.0. It allows remote attackers to cause a denial of service (attempted excessive memory allocation) in opjcalloc in openjp2/opjmalloc.c, when called from opjtcdinittile in openjp2/tcd.c, as demonstrated by the 64-bit opjdecompress.

References

Affected packages

Ubuntu:22.04:LTS
openjpeg2

Package

Name
openjpeg2
Purl
pkg:deb/ubuntu/openjpeg2@2.4.0-6ubuntu0.4?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.3.1-1ubuntu5
2.3.1-1ubuntu6
2.4.0-3
2.4.0-5
2.4.0-6
2.4.0-6ubuntu0.1
2.4.0-6ubuntu0.2
2.4.0-6ubuntu0.3
2.4.0-6ubuntu0.4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.4.0-6ubuntu0.4",
            "binary_name": "libopenjp2-7"
        },
        {
            "binary_version": "2.4.0-6ubuntu0.4",
            "binary_name": "libopenjp2-tools"
        },
        {
            "binary_version": "2.4.0-6ubuntu0.4",
            "binary_name": "libopenjp3d-tools"
        },
        {
            "binary_version": "2.4.0-6ubuntu0.4",
            "binary_name": "libopenjp3d7"
        },
        {
            "binary_version": "2.4.0-6ubuntu0.4",
            "binary_name": "libopenjpip-dec-server"
        },
        {
            "binary_version": "2.4.0-6ubuntu0.4",
            "binary_name": "libopenjpip-server"
        },
        {
            "binary_version": "2.4.0-6ubuntu0.4",
            "binary_name": "libopenjpip-viewer"
        },
        {
            "binary_version": "2.4.0-6ubuntu0.4",
            "binary_name": "libopenjpip7"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-6988.json"
Ubuntu:24.04:LTS
openjpeg2

Package

Name
openjpeg2
Purl
pkg:deb/ubuntu/openjpeg2@2.5.0-2ubuntu0.4?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.5.0-2
2.5.0-2build2
2.5.0-2build3
2.5.0-2ubuntu0.1
2.5.0-2ubuntu0.2
2.5.0-2ubuntu0.3
2.5.0-2ubuntu0.4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.5.0-2ubuntu0.4",
            "binary_name": "libopenjp2-7"
        },
        {
            "binary_version": "2.5.0-2ubuntu0.4",
            "binary_name": "libopenjp2-tools"
        },
        {
            "binary_version": "2.5.0-2ubuntu0.4",
            "binary_name": "libopenjpip-dec-server"
        },
        {
            "binary_version": "2.5.0-2ubuntu0.4",
            "binary_name": "libopenjpip-server"
        },
        {
            "binary_version": "2.5.0-2ubuntu0.4",
            "binary_name": "libopenjpip-viewer"
        },
        {
            "binary_version": "2.5.0-2ubuntu0.4",
            "binary_name": "libopenjpip7"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-6988.json"
Ubuntu:25.10
openjpeg2

Package

Name
openjpeg2
Purl
pkg:deb/ubuntu/openjpeg2@2.5.3-2.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.5.3-2
2.5.3-2.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.5.3-2.1",
            "binary_name": "libopenjp2-7"
        },
        {
            "binary_version": "2.5.3-2.1",
            "binary_name": "libopenjp2-tools"
        },
        {
            "binary_version": "2.5.3-2.1",
            "binary_name": "libopenjpip-dec-server"
        },
        {
            "binary_version": "2.5.3-2.1",
            "binary_name": "libopenjpip-viewer"
        },
        {
            "binary_version": "2.5.3-2.1",
            "binary_name": "libopenjpip7"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-6988.json"
Ubuntu:Pro:16.04:LTS
ghostscript

Package

Name
ghostscript
Purl
pkg:deb/ubuntu/ghostscript@9.26~dfsg+0-0ubuntu0.16.04.14+esm10?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*
9.16~dfsg~0-0ubuntu3
9.16~dfsg~0-0ubuntu4
9.18~dfsg~0-0ubuntu1
9.18~dfsg~0-0ubuntu2
9.18~dfsg~0-0ubuntu2.2
9.18~dfsg~0-0ubuntu2.3
9.18~dfsg~0-0ubuntu2.4
9.18~dfsg~0-0ubuntu2.6
9.18~dfsg~0-0ubuntu2.7
9.18~dfsg~0-0ubuntu2.8
9.18~dfsg~0-0ubuntu2.9
9.25~dfsg+1-0ubuntu0.16.04.1
9.25~dfsg+1-0ubuntu0.16.04.2
9.25~dfsg+1-0ubuntu0.16.04.3
9.26~dfsg+0-0ubuntu0.16.04.1
9.26~dfsg+0-0ubuntu0.16.04.3
9.26~dfsg+0-0ubuntu0.16.04.4
9.26~dfsg+0-0ubuntu0.16.04.5
9.26~dfsg+0-0ubuntu0.16.04.6
9.26~dfsg+0-0ubuntu0.16.04.7
9.26~dfsg+0-0ubuntu0.16.04.8
9.26~dfsg+0-0ubuntu0.16.04.9
9.26~dfsg+0-0ubuntu0.16.04.10
9.26~dfsg+0-0ubuntu0.16.04.11
9.26~dfsg+0-0ubuntu0.16.04.12
9.26~dfsg+0-0ubuntu0.16.04.13
9.26~dfsg+0-0ubuntu0.16.04.14
9.26~dfsg+0-0ubuntu0.16.04.14+esm1
9.26~dfsg+0-0ubuntu0.16.04.14+esm2
9.26~dfsg+0-0ubuntu0.16.04.14+esm3
9.26~dfsg+0-0ubuntu0.16.04.14+esm4
9.26~dfsg+0-0ubuntu0.16.04.14+esm5
9.26~dfsg+0-0ubuntu0.16.04.14+esm6
9.26~dfsg+0-0ubuntu0.16.04.14+esm7
9.26~dfsg+0-0ubuntu0.16.04.14+esm8
9.26~dfsg+0-0ubuntu0.16.04.14+esm9
9.26~dfsg+0-0ubuntu0.16.04.14+esm10

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "9.26~dfsg+0-0ubuntu0.16.04.14+esm10",
            "binary_name": "ghostscript"
        },
        {
            "binary_version": "9.26~dfsg+0-0ubuntu0.16.04.14+esm10",
            "binary_name": "ghostscript-x"
        },
        {
            "binary_version": "9.26~dfsg+0-0ubuntu0.16.04.14+esm10",
            "binary_name": "libgs9"
        },
        {
            "binary_version": "9.26~dfsg+0-0ubuntu0.16.04.14+esm10",
            "binary_name": "libgs9-common"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-6988.json"
openjpeg2

Package

Name
openjpeg2
Purl
pkg:deb/ubuntu/openjpeg2@2.1.2-1.1+deb9u6ubuntu0.1~esm7?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.1.0-2.1
2.1.0-2.1ubuntu0.1
2.1.2-1.1+deb9u2build0.1
2.1.2-1.1+deb9u3build0.16.04.1
2.1.2-1.1+deb9u3ubuntu0.1~esm1
2.1.2-1.1+deb9u5build0.16.04.1
2.1.2-1.1+deb9u5ubuntu0.1~esm1
2.1.2-1.1+deb9u6build0.16.04.1
2.1.2-1.1+deb9u6ubuntu0.1~esm1
2.1.2-1.1+deb9u6ubuntu0.1~esm3
2.1.2-1.1+deb9u6ubuntu0.1~esm4
2.1.2-1.1+deb9u6ubuntu0.1~esm6
2.1.2-1.1+deb9u6ubuntu0.1~esm7

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.1.2-1.1+deb9u6ubuntu0.1~esm7",
            "binary_name": "libopenjp2-7"
        },
        {
            "binary_version": "2.1.2-1.1+deb9u6ubuntu0.1~esm7",
            "binary_name": "libopenjp2-tools"
        },
        {
            "binary_version": "2.1.2-1.1+deb9u6ubuntu0.1~esm7",
            "binary_name": "libopenjp3d-tools"
        },
        {
            "binary_version": "2.1.2-1.1+deb9u6ubuntu0.1~esm7",
            "binary_name": "libopenjp3d7"
        },
        {
            "binary_version": "2.1.2-1.1+deb9u6ubuntu0.1~esm7",
            "binary_name": "libopenjpip-dec-server"
        },
        {
            "binary_version": "2.1.2-1.1+deb9u6ubuntu0.1~esm7",
            "binary_name": "libopenjpip-server"
        },
        {
            "binary_version": "2.1.2-1.1+deb9u6ubuntu0.1~esm7",
            "binary_name": "libopenjpip-viewer"
        },
        {
            "binary_version": "2.1.2-1.1+deb9u6ubuntu0.1~esm7",
            "binary_name": "libopenjpip7"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-6988.json"
Ubuntu:Pro:18.04:LTS
ghostscript

Package

Name
ghostscript
Purl
pkg:deb/ubuntu/ghostscript@9.26~dfsg+0-0ubuntu0.18.04.18+esm5?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*
9.21~dfsg+1-0ubuntu3
9.22~dfsg+1-0ubuntu1
9.22~dfsg+1-0ubuntu1.1
9.22~dfsg+1-0ubuntu1.2
9.25~dfsg+1-0ubuntu0.18.04.1
9.25~dfsg+1-0ubuntu0.18.04.2
9.26~dfsg+0-0ubuntu0.18.04.1
9.26~dfsg+0-0ubuntu0.18.04.3
9.26~dfsg+0-0ubuntu0.18.04.4
9.26~dfsg+0-0ubuntu0.18.04.5
9.26~dfsg+0-0ubuntu0.18.04.6
9.26~dfsg+0-0ubuntu0.18.04.7
9.26~dfsg+0-0ubuntu0.18.04.8
9.26~dfsg+0-0ubuntu0.18.04.9
9.26~dfsg+0-0ubuntu0.18.04.10
9.26~dfsg+0-0ubuntu0.18.04.11
9.26~dfsg+0-0ubuntu0.18.04.12
9.26~dfsg+0-0ubuntu0.18.04.13
9.26~dfsg+0-0ubuntu0.18.04.14
9.26~dfsg+0-0ubuntu0.18.04.15
9.26~dfsg+0-0ubuntu0.18.04.16
9.26~dfsg+0-0ubuntu0.18.04.17
9.26~dfsg+0-0ubuntu0.18.04.18
9.26~dfsg+0-0ubuntu0.18.04.18+esm1
9.26~dfsg+0-0ubuntu0.18.04.18+esm2
9.26~dfsg+0-0ubuntu0.18.04.18+esm3
9.26~dfsg+0-0ubuntu0.18.04.18+esm4
9.26~dfsg+0-0ubuntu0.18.04.18+esm5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "9.26~dfsg+0-0ubuntu0.18.04.18+esm5",
            "binary_name": "ghostscript"
        },
        {
            "binary_version": "9.26~dfsg+0-0ubuntu0.18.04.18+esm5",
            "binary_name": "ghostscript-x"
        },
        {
            "binary_version": "9.26~dfsg+0-0ubuntu0.18.04.18+esm5",
            "binary_name": "libgs9"
        },
        {
            "binary_version": "9.26~dfsg+0-0ubuntu0.18.04.18+esm5",
            "binary_name": "libgs9-common"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-6988.json"
openjpeg2

Package

Name
openjpeg2
Purl
pkg:deb/ubuntu/openjpeg2@2.3.0-2+deb10u2ubuntu0.1~esm5?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.2.0-1
2.3.0-1
2.3.0-2build0.18.04.1
2.3.0-2ubuntu0.1~esm1
2.3.0-2+deb10u2build0.18.04.1
2.3.0-2+deb10u2ubuntu0.1~esm1
2.3.0-2+deb10u2ubuntu0.1~esm2
2.3.0-2+deb10u2ubuntu0.1~esm3
2.3.0-2+deb10u2ubuntu0.1~esm4
2.3.0-2+deb10u2ubuntu0.1~esm5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.3.0-2+deb10u2ubuntu0.1~esm5",
            "binary_name": "libopenjp2-7"
        },
        {
            "binary_version": "2.3.0-2+deb10u2ubuntu0.1~esm5",
            "binary_name": "libopenjp2-tools"
        },
        {
            "binary_version": "2.3.0-2+deb10u2ubuntu0.1~esm5",
            "binary_name": "libopenjp3d-tools"
        },
        {
            "binary_version": "2.3.0-2+deb10u2ubuntu0.1~esm5",
            "binary_name": "libopenjp3d7"
        },
        {
            "binary_version": "2.3.0-2+deb10u2ubuntu0.1~esm5",
            "binary_name": "libopenjpip-dec-server"
        },
        {
            "binary_version": "2.3.0-2+deb10u2ubuntu0.1~esm5",
            "binary_name": "libopenjpip-server"
        },
        {
            "binary_version": "2.3.0-2+deb10u2ubuntu0.1~esm5",
            "binary_name": "libopenjpip-viewer"
        },
        {
            "binary_version": "2.3.0-2+deb10u2ubuntu0.1~esm5",
            "binary_name": "libopenjpip7"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-6988.json"
Ubuntu:Pro:20.04:LTS
openjpeg2

Package

Name
openjpeg2
Purl
pkg:deb/ubuntu/openjpeg2@2.3.1-1ubuntu4.20.04.4+esm1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.3.0-2
2.3.0-2build1
2.3.1-1
2.3.1-1ubuntu3
2.3.1-1ubuntu4
2.3.1-1ubuntu4.20.04.1
2.3.1-1ubuntu4.20.04.2
2.3.1-1ubuntu4.20.04.3
2.3.1-1ubuntu4.20.04.4
2.3.1-1ubuntu4.20.04.4+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.3.1-1ubuntu4.20.04.4+esm1",
            "binary_name": "libopenjp2-7"
        },
        {
            "binary_version": "2.3.1-1ubuntu4.20.04.4+esm1",
            "binary_name": "libopenjp2-tools"
        },
        {
            "binary_version": "2.3.1-1ubuntu4.20.04.4+esm1",
            "binary_name": "libopenjp3d-tools"
        },
        {
            "binary_version": "2.3.1-1ubuntu4.20.04.4+esm1",
            "binary_name": "libopenjp3d7"
        },
        {
            "binary_version": "2.3.1-1ubuntu4.20.04.4+esm1",
            "binary_name": "libopenjpip-dec-server"
        },
        {
            "binary_version": "2.3.1-1ubuntu4.20.04.4+esm1",
            "binary_name": "libopenjpip-server"
        },
        {
            "binary_version": "2.3.1-1ubuntu4.20.04.4+esm1",
            "binary_name": "libopenjpip-viewer"
        },
        {
            "binary_version": "2.3.1-1ubuntu4.20.04.4+esm1",
            "binary_name": "libopenjpip7"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-6988.json"