ghostscript is vulnerable to denial of service. The vulnerability exists in opj_t2_encode_packet()
function of t2.c
due to an out-of-bounds read which allows an attacker to crash the application via malicious input.
bugzilla.redhat.com/show_bug.cgi?id=1907516
git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2020-27843
github.com/uclouvain/openjpeg/commit/38d661a3897052c7ff0b39b30c29cb067e130121
github.com/uclouvain/openjpeg/issues/1297
github.com/uclouvain/openjpeg/pull/1298
lists.debian.org/debian-lts-announce/2022/04/msg00006.html
lists.fedoraproject.org/archives/list/[email protected]/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/
security.gentoo.org/glsa/202101-29
www.debian.org/security/2021/dsa-4882
www.oracle.com//security-alerts/cpujul2021.html
www.oracle.com/security-alerts/cpuApr2021.html