CVE Vulnerabilities

CVE-2022-1122

Improper Initialization

Published: Mar 29, 2022 | Modified: Nov 03, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.1 LOW
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.

Weakness

The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.

Affected Software

NameVendorStart VersionEnd Version
OpenjpegUclouvain2.4.0 (including)2.4.0 (including)
Red Hat Enterprise Linux 8RedHatopenjpeg2-0:2.4.0-5.el8*
Red Hat Enterprise Linux 9RedHatopenjpeg2-0:2.4.0-7.el9*
BlenderUbuntubionic*
BlenderUbuntufocal*
BlenderUbuntuimpish*
BlenderUbuntukinetic*
BlenderUbuntulunar*
BlenderUbuntumantic*
BlenderUbuntuoracular*
BlenderUbuntuplucky*
BlenderUbuntutrusty*
BlenderUbuntuxenial*
GhostscriptUbuntutrusty*
GhostscriptUbuntuxenial*
Insighttoolkit4Ubuntubionic*
Insighttoolkit4Ubuntufocal*
Insighttoolkit4Ubuntuimpish*
Insighttoolkit4Ubuntukinetic*
Insighttoolkit4Ubuntulunar*
Insighttoolkit4Ubuntutrusty*
Insighttoolkit4Ubuntuxenial*
OpenjpegUbuntuupstream*
Openjpeg2Ubuntubionic*
Openjpeg2Ubuntuesm-apps/bionic*
Openjpeg2Ubuntuesm-apps/xenial*
Openjpeg2Ubuntuesm-infra/focal*
Openjpeg2Ubuntufocal*
Openjpeg2Ubuntuimpish*
Openjpeg2Ubuntujammy*
Openjpeg2Ubuntukinetic*
Openjpeg2Ubuntulunar*
Openjpeg2Ubuntuupstream*
Openjpeg2Ubuntuxenial*
Qtwebengine-opensource-srcUbuntubionic*
Qtwebengine-opensource-srcUbuntufocal*
Qtwebengine-opensource-srcUbuntuimpish*
Qtwebengine-opensource-srcUbuntukinetic*
Qtwebengine-opensource-srcUbuntulunar*
Qtwebengine-opensource-srcUbuntumantic*
Qtwebengine-opensource-srcUbuntuoracular*
Qtwebengine-opensource-srcUbuntuplucky*
TexmakerUbuntubionic*
TexmakerUbuntufocal*
TexmakerUbuntuimpish*
TexmakerUbuntukinetic*
TexmakerUbuntulunar*
TexmakerUbuntumantic*
TexmakerUbuntuoracular*
TexmakerUbuntuplucky*
TexmakerUbuntutrusty*
TexmakerUbuntuxenial*

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, in Java, if the programmer does not explicitly initialize a variable, then the code could produce a compile-time error (if the variable is local) or automatically initialize the variable to the default value for the variable’s type. In Perl, if explicit initialization is not performed, then a default value of undef is assigned, which is interpreted as 0, false, or an equivalent value depending on the context in which the variable is accessed.

References