First published: Wed Dec 09 2020(Updated: )
A flaw was found in OpenJPEG’s encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openjpeg | <2.4.0 | 2.4.0 |
debian/openjpeg2 | 2.4.0-3 2.5.0-2 | |
uclouvain openjpeg | <2.4.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-27823 is high with a CVSS score of 7.8.
CVE-2020-27823 allows an attacker to pass specially crafted x, y offset input to OpenJPEG's encoder, which can lead to confidentiality, integrity, and system availability issues.
OpenJPEG versions 2.3.1-1ubuntu4.20.04.1, 2.3.1-1ubuntu4.20.10.1, 2.3.1-1ubuntu5, 2.3.0-2+, 2.4.0, and 2.1.2-1.1+ are affected by CVE-2020-27823.
Apply the recommended updates for OpenJPEG by following the instructions provided by your software vendor or project team.
You can find more information about CVE-2020-27823 on the MITRE CVE database (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823) and the Ubuntu Security Notices (USN-4685-1, USN-4880-1) websites.