The vulnerability is a denial of service due to excessive memory allocation. The provided commit b287b27a87ecfbbd3b1206b17269d19e76a1b467 directly modifies the opj_calloc function in src/lib/openjp2/opj_malloc.c. The changes introduce a mechanism to track and limit the total memory allocated by this function. This clearly indicates that opj_calloc was the function through which the excessive memory allocation, leading to the denial of service, was occurring. The pull request description explicitly states that opj_calloc was identified as the function allocating large amounts of memory in a loop when processing the proof-of-concept file. Therefore, opj_calloc is the vulnerable function as it processed requests for memory allocation without sufficient checks, allowing a crafted input to exhaust system resources.