First published: Mon Dec 07 2020(Updated: )
There's a flaw in jasper's jpc encoder in versions prior to 2.0.23. Crafted input provided to jasper by an attacker could cause an arbitrary out-of-bounds write. This could potentially affect data confidentiality, integrity, or application availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jasper | <2.0.23 | 2.0.23 |
Jasper Project Jasper | <2.0.23 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw in jasper's jpc encoder is CVE-2020-27828.
CVE-2020-27828 has a severity rating of 7.8 (high).
An attacker can exploit this vulnerability by providing crafted input to jasper's jpc encoder, causing an arbitrary out-of-bounds write.
Versions of jasper prior to 2.0.23 are affected by this vulnerability.
To fix this vulnerability, upgrade jasper to version 2.0.23 or later.