OpenJPEG is vulnerable to denial of service. A heap-based buffer overflow in opj_t1_clbl_decode_processor
in openjp2/t1.c
due to lack of opj_j2k_update_image_dimensions
validation allows an attacker to crash the application.
access.redhat.com/errata/RHSA-2020:0262
access.redhat.com/errata/RHSA-2020:0274
access.redhat.com/errata/RHSA-2020:0296
git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2020-6851
github.com/uclouvain/openjpeg/issues/1228
lists.debian.org/debian-lts-announce/2020/01/msg00025.html
lists.debian.org/debian-lts-announce/2020/07/msg00008.html
lists.fedoraproject.org/archives/list/[email protected]/message/LACIIDDCKZJEPKTTFILSOSBQL7L3FC6V/
lists.fedoraproject.org/archives/list/[email protected]/message/XBRMI2D3XPVWKE3V52KRBW7BJVLS5LD3/
www.debian.org/security/2021/dsa-4882
www.oracle.com/security-alerts/cpujul2020.html