{"containers":{"cna":{"affected":[{"product":"openjpeg","vendor":"n/a","versions":[{"status":"affected","version":"openjpeg 2.4.0"}]}],"descriptions":[{"lang":"en","value":"A flaw was found in OpenJPEG’s encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20->CWE-120->CWE-787","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-05-13T14:04:18.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"FEDORA-2020-4cd57a6876","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQR4EWRFFZQDMFPZKFZ6I3USLMW6TKTP/"},{"name":"FEDORA-2020-d32853a28d","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/"},{"name":"[debian-lts-announce] 20210208 [SECURITY] [DLA 2550-1] openjpeg2 security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html"},{"name":"DSA-4882","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"https://www.debian.org/security/2021/dsa-4882"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905762"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2020-27823","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"openjpeg","version":{"version_data":[{"version_value":"openjpeg 2.4.0"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A flaw was found in OpenJPEG’s encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-20->CWE-120->CWE-787"}]}]},"references":{"reference_data":[{"name":"FEDORA-2020-4cd57a6876","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQR4EWRFFZQDMFPZKFZ6I3USLMW6TKTP/"},{"name":"FEDORA-2020-d32853a28d","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/"},{"name":"[debian-lts-announce] 20210208 [SECURITY] [DLA 2550-1] openjpeg2 security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html"},{"name":"DSA-4882","refsource":"DEBIAN","url":"https://www.debian.org/security/2021/dsa-4882"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1905762","refsource":"MISC","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905762"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T16:25:43.670Z"},"title":"CVE Program Container","references":[{"name":"FEDORA-2020-4cd57a6876","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQR4EWRFFZQDMFPZKFZ6I3USLMW6TKTP/"},{"name":"FEDORA-2020-d32853a28d","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/"},{"name":"[debian-lts-announce] 20210208 [SECURITY] [DLA 2550-1] openjpeg2 security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html"},{"name":"DSA-4882","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"https://www.debian.org/security/2021/dsa-4882"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905762"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2020-27823","datePublished":"2021-05-13T14:03:50.000Z","dateReserved":"2020-10-27T00:00:00.000Z","dateUpdated":"2024-08-04T16:25:43.670Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}