7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
64.2%
Debian Security Advisory DSA-4882-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
April 01, 2021 https://www.debian.org/security/faq
Package : openjpeg2
CVE ID : CVE-2020-6851 CVE-2020-8112 CVE-2020-15389 CVE-2020-27814
CVE-2020-27823 CVE-2020-27824 CVE-2020-27841 CVE-2020-27842
CVE-2020-27843 CVE-2020-27845
Multiple vulnerabilities have been discovered in openjpeg2, the
open-source JPEG 2000 codec, which could result in denial of service or
the execution of arbitrary code when opening a malformed image.
For the stable distribution (buster), these problems have been fixed in
version 2.3.0-2+deb10u2.
We recommend that you upgrade your openjpeg2 packages.
For the detailed security status of openjpeg2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openjpeg2
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | arm64 | libopenjpip-dec-server | < 2.1.2-1.1+deb9u6 | libopenjpip-dec-server_2.1.2-1.1+deb9u6_arm64.deb |
Debian | 10 | amd64 | libopenjpip-server-dbgsym | < 2.3.0-2+deb10u2 | libopenjpip-server-dbgsym_2.3.0-2+deb10u2_amd64.deb |
Debian | 9 | amd64 | libopenjp2-7-dev | < 2.1.2-1.1+deb9u6 | libopenjp2-7-dev_2.1.2-1.1+deb9u6_amd64.deb |
Debian | 9 | amd64 | libopenjp2-7 | < 2.1.2-1.1+deb9u6 | libopenjp2-7_2.1.2-1.1+deb9u6_amd64.deb |
Debian | 9 | amd64 | libopenjpip-server | < 2.1.2-1.1+deb9u6 | libopenjpip-server_2.1.2-1.1+deb9u6_amd64.deb |
Debian | 10 | all | openjpeg2 | < 2.3.0-2+deb10u2 | openjpeg2_2.3.0-2+deb10u2_all.deb |
Debian | 10 | arm64 | libopenjpip-server | < 2.3.0-2+deb10u2 | libopenjpip-server_2.3.0-2+deb10u2_arm64.deb |
Debian | 10 | mips64el | libopenjp2-tools-dbgsym | < 2.3.0-2+deb10u2 | libopenjp2-tools-dbgsym_2.3.0-2+deb10u2_mips64el.deb |
Debian | 10 | mips | libopenjpip-dec-server | < 2.3.0-2+deb10u2 | libopenjpip-dec-server_2.3.0-2+deb10u2_mips.deb |
Debian | 10 | mips64el | libopenjpip-dec-server | < 2.3.0-2+deb10u2 | libopenjpip-dec-server_2.3.0-2+deb10u2_mips64el.deb |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
64.2%