There's a flaw in openjpeg's t2 encoder in versions prior to 2.4.0. An attacker who is able to provide crafted input to be processed by openjpeg could cause a null pointer dereference. The highest impact of this flaw is to application availability.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-27842.json"
[
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://gitlab.freedesktop.org/slirp/libslirp@dd94020cca59925585c39414929b1eb5079bb11d",
"digest": {
"line_hashes": [
"150371023777414186472222309514807155810",
"42780800527369088609241952880313372145",
"156604947206935330073286223434464454440"
],
"threshold": 0.9
},
"id": "CVE-2020-27842-4186c437",
"deprecated": false,
"target": {
"file": "misc.c"
}
}
]