Description
OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2081-1 | openjpeg2 security update |
Debian DLA |
DLA-2089-1 | openjpeg2 security update |
Debian DLA |
DLA-2277-1 | openjpeg2 security update |
Debian DSA |
DSA-4882-1 | openjpeg2 security update |
EUVD |
EUVD-2020-27994 | OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation. |
Ubuntu USN |
USN-4497-1 | OpenJPEG vulnerabilities |
Ubuntu USN |
USN-4686-1 | Ghostscript vulnerabilities |
Ubuntu USN |
USN-5952-1 | OpenJPEG vulnerabilities |
References
History
No history.
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Oracle
Subscribe
Georaster
Subscribe
Outside In Technology
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Rhel E4s
Subscribe
Uclouvain
Subscribe
Openjpeg
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T09:11:05.204Z
Reserved: 2020-01-13T00:00:00.000Z
Link: CVE-2020-6851
No data.
Status : Modified
Published: 2020-01-13T06:15:10.957
Modified: 2024-11-21T05:36:17.597
Link: CVE-2020-6851
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN