CVE-2020-27841

MEDIUM

Uclouvain Openjpeg < 2.4.0 - Out-of-Bounds Write

Title source: rule
STIX 2.1

Description

There's a flaw in openjpeg in versions prior to 2.4.0 in src/lib/openjp2/pi.c. When an attacker is able to provide crafted input to be processed by the openjpeg encoder, this could cause an out-of-bounds read. The greatest impact from this flaw is to application availability.

References (7)

Core 7
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=1907510
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202101-29
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2021/dsa-4882
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuApr2021.html
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com//security-alerts/cpujul2021.html

Scores

CVSS v3 5.5
EPSS 0.0031
EPSS Percentile 54.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Details

CWE
CWE-122 CWE-787
Status published
Products (5)
debian/debian_linux 9.0
debian/debian_linux 10.0
fedoraproject/fedora 32
oracle/outside_in_technology 8.5.5
uclouvain/openjpeg < 2.4.0
Published Jan 05, 2021
Tracked Since Feb 18, 2026