Package        : openjpeg2
Version        : 2.1.0-2+deb8u8
CVE ID         : CVE-2018-21010
Debian Bug     : 939553

A heap buffer overflow vulnerability was discovered in openjpeg2, the
open-source JPEG 2000 codec. This vulnerability is caused by insufficient
validation of width and height of image components in color_apply_icc_profile
(src/bin/common/color.c).  Remote attackers might leverage this vulnerability
via a crafted JP2 file, leading to denial of service (application crash) or any
other undefined behavior.

For Debian 8 "Jessie", this problem has been fixed in version
2.1.0-2+deb8u8.

We recommend that you upgrade your openjpeg2 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-1950-1: openjpeg2 security update

October 8, 2019
A heap buffer overflow vulnerability was discovered in openjpeg2, the open-source JPEG 2000 codec

Summary

We recommend that you upgrade your openjpeg2 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : openjpeg2
Version : 2.1.0-2+deb8u8
CVE ID : CVE-2018-21010
Debian Bug : 939553

Related News