Description
A flaw was found in OpenJPEG’s encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2550-1 | openjpeg2 security update |
Debian DSA |
DSA-4882-1 | openjpeg2 security update |
EUVD |
EUVD-2020-20324 | A flaw was found in OpenJPEG’s encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability. |
Ubuntu USN |
USN-4685-1 | OpenJPEG vulnerabilities |
Ubuntu USN |
USN-4686-1 | Ghostscript vulnerabilities |
Ubuntu USN |
USN-4880-1 | OpenJPEG vulnerabilities |
Ubuntu USN |
USN-5664-1 | OpenJPEG vulnerabilities |
Ubuntu USN |
USN-5952-1 | OpenJPEG vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T16:25:43.431Z
Reserved: 2020-10-27T00:00:00.000Z
Link: CVE-2020-27824
No data.
Status : Modified
Published: 2021-05-13T14:15:17.557
Modified: 2024-11-21T05:21:52.893
Link: CVE-2020-27824
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN