OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2020:0262 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0274 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0296 | Third Party Advisory |
https://github.com/uclouvain/openjpeg/issues/1228 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/01/msg00025.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LACIIDDCKZJEPKTTFILSOSBQL7L3FC6V/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XBRMI2D3XPVWKE3V52KRBW7BJVLS5LD3/ | |
https://www.debian.org/security/2021/dsa-4882 | Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2020.html | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-01-13T05:02:35
Updated: 2021-04-02T11:07:09
Reserved: 2020-01-13T00:00:00
Link: CVE-2020-6851
JSON object: View
NVD Information
Status : Modified
Published: 2020-01-13T06:15:10.957
Modified: 2023-11-07T03:25:31.623
Link: CVE-2020-6851
JSON object: View
Redhat Information
No data.
CWE