Search for packages
| purl | pkg:deb/debian/openjpeg2@2.3.1-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1z5a-aa47-dyft | openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c leads to denial of service |
CVE-2018-20846
|
| VCID-ecez-3pwt-pudf | openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c |
CVE-2018-20845
|
| VCID-hxax-t3zc-8kax | openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c |
CVE-2018-5727
|
| VCID-xvjg-5z4m-pqdv | openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c |
CVE-2018-20847
|
| VCID-yb58-a8p7-v7dw | Multiple vulnerabilities have been found in OpenJPEG, the worst of which could result in the arbitrary execution of code. |
CVE-2018-21010
|
| VCID-z1a1-p95p-sya2 | An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line. |
CVE-2018-7648
|
| VCID-zz9f-brcy-ekdy | openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c |
CVE-2018-16375
|