Source: openjpeg2 Version: 2.5.0-2 Severity: important Tags: security upstream Forwarded: https://github.com/uclouvain/openjpeg/issues/1563 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for openjpeg2. CVE-2024-56826[0]: | A flaw was found in the OpenJPEG project. A heap buffer overflow | condition may be triggered when certain options are specified while | using the opj_decompress utility. This can lead to an application | crash or other undefined behavior. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-56826 https://www.cve.org/CVERecord?id=CVE-2024-56826 [1] https://github.com/uclouvain/openjpeg/issues/1563 [2] https://github.com/uclouvain/openjpeg/commit/98592ee6d6904f1b48e8207238779b89a63befa2 Please adjust the affected versions in the BTS as needed. Regards, Salvatore
