OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fedoraproject Subscribe
Georaster Subscribe
Outside In Technology Subscribe
Enterprise Linux Subscribe
Enterprise Linux Desktop Subscribe
Enterprise Linux Eus Subscribe
Enterprise Linux Server Subscribe
Enterprise Linux Server Aus Subscribe
Enterprise Linux Server Tus Subscribe
Enterprise Linux Workstation Subscribe
Rhel E4s Subscribe
Uclouvain Subscribe
Openjpeg Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2081-1 openjpeg2 security update
Debian DLA Debian DLA DLA-2089-1 openjpeg2 security update
Debian DLA Debian DLA DLA-2277-1 openjpeg2 security update
Debian DSA Debian DSA DSA-4882-1 openjpeg2 security update
EUVD EUVD EUVD-2020-27994 OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.
Ubuntu USN Ubuntu USN USN-4497-1 OpenJPEG vulnerabilities
Ubuntu USN Ubuntu USN USN-4686-1 Ghostscript vulnerabilities
Ubuntu USN Ubuntu USN USN-5952-1 OpenJPEG vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T09:11:05.204Z

Reserved: 2020-01-13T00:00:00

Link: CVE-2020-6851

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-13T06:15:10.957

Modified: 2024-11-21T05:36:17.597

Link: CVE-2020-6851

cve-icon Redhat

Severity : Important

Publid Date: 2020-01-13T00:00:00Z

Links: CVE-2020-6851 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses