{
  "threat_severity" : "Moderate",
  "public_date" : "2020-11-25T00:00:00Z",
  "bugzilla" : {
    "description" : "openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode()",
    "id" : "1905762",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1905762"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-20->CWE-120->CWE-787",
  "details" : [ "A flaw was found in OpenJPEG’s encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "A flaw was found in OpenJPEG’s encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability." ],
  "statement" : "Red Hat Product Security has rated this flaw with Moderate severity because it affects the encoder functionality specifically when performing an image conversion and not general reading of image files.",
  "acknowledgement" : "Red Hat would like to thank zodf0055980 (SQLab NCTU Taiwan) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2021-11-09T00:00:00Z",
    "advisory" : "RHSA-2021:4251",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "openjpeg2-0:2.4.0-4.el8"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "openjpeg",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "openjpeg",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "openjpeg2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-27823\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-27823" ],
  "name" : "CVE-2020-27823",
  "mitigation" : {
    "value" : "This flaw can be mitigated by not using openjpeg to convert untrusted image files.",
    "lang" : "en:us"
  },
  "csaw" : false
}