First published: Mon Dec 14 2020(Updated: )
A flaw was found in OpenJPEG. Specially crafted files can lead to multiple heap-based buffer overflows in lib/openjp2/pi.c. Reference: <a href="https://github.com/uclouvain/openjpeg/issues/1293">https://github.com/uclouvain/openjpeg/issues/1293</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Uclouvain Openjpeg | <2.4.0 | |
Fedoraproject Fedora | =32 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Oracle Outside In Technology | =8.5.5 | |
redhat/openjpeg | <2.4.0 | 2.4.0 |
debian/openjpeg2 | 2.4.0-3 2.5.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this flaw in openjpeg is CVE-2020-27841.
The severity of CVE-2020-27841 is medium with a severity value of 5.5.
Versions of openjpeg prior to 2.4.0 are affected by CVE-2020-27841.
The greatest impact of CVE-2020-27841 is to application availability.
To fix CVE-2020-27841, update openjpeg to version 2.4.0 or later.