Source: openjpeg2 Version: 2.5.0-2 Severity: important Tags: security upstream Forwarded: https://github.com/uclouvain/openjpeg/issues/1564 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for openjpeg2. CVE-2024-56827[0]: | A flaw was found in the OpenJPEG project. A heap buffer overflow | condition may be triggered when certain options are specified while | using the opj_decompress utility. This can lead to an application | crash or other undefined behavior. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-56827 https://www.cve.org/CVERecord?id=CVE-2024-56827 [1] https://github.com/uclouvain/openjpeg/issues/1564 [2] https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8 Please adjust the affected versions in the BTS as needed. Regards, Salvatore
