Name | CVE-2020-27823 |
Description | A flaw was found in OpenJPEG’s encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2550-1, DSA-4882-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
openjpeg2 (PTS) | jessie, jessie (lts) | 2.1.0-2+deb8u14 | fixed |
stretch (security), stretch (lts), stretch | 2.1.2-1.1+deb9u7 | fixed | |
buster (security), buster, buster (lts) | 2.3.0-2+deb10u2 | fixed | |
bullseye | 2.4.0-3 | fixed | |
sid, trixie, bookworm | 2.5.0-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
openjpeg2 | source | jessie | (not affected) | |||
openjpeg2 | source | stretch | 2.1.2-1.1+deb9u6 | DLA-2550-1 | ||
openjpeg2 | source | buster | 2.3.0-2+deb10u2 | DSA-4882-1 | ||
openjpeg2 | source | (unstable) | 2.4.0-1 |
https://github.com/uclouvain/openjpeg/issues/1284
https://github.com/uclouvain/openjpeg/commit/b2072402b7e14d22bba6fb8cde2a1e9996e9a919 (v2.4.0)
[jessie] - openjpeg2 <not-affected> (Vulnerable code introduced later)