Bug#1133832: openjpeg2: CVE-2026-6192

Salvatore Bonaccorso carnil at debian.org
Tue Apr 14 19:22:42 BST 2026


Source: openjpeg2
Version: 2.5.4-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/uclouvain/openjpeg/issues/1619
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerability was published for openjpeg2.

CVE-2026-6192[0]:
| A vulnerability was identified in uclouvain openjpeg up to 2.5.4.
| This impacts the function opj_pi_initialise_encode in the library
| src/lib/openjp2/pi.c. The manipulation leads to integer overflow.
| The attack must be carried out locally. The exploit is publicly
| available and might be used. The identifier of the patch is
| 839936aa33eb8899bbbd80fda02796bb65068951. It is suggested to install
| a patch to address this issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-6192
    https://www.cve.org/CVERecord?id=CVE-2026-6192
[1] https://github.com/uclouvain/openjpeg/issues/1619
[2] https://github.com/uclouvain/openjpeg/pull/1628
[3] https://github.com/uclouvain/openjpeg/commit/839936aa33eb8899bbbd80fda02796bb65068951

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the Pkg-phototools-devel mailing list