Lucene search

K
mageiaGentoo FoundationMGASA-2015-0398
HistoryOct 14, 2015 - 1:40 a.m.

Updated openjpeg2 package fixes security vulnerability

2015-10-1401:40:25
Gentoo Foundation
advisories.mageia.org
8

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.042 Low

EPSS

Percentile

92.2%

Use-after-free vulnerability was found in j2k.c in opj_j2k_write_mco function (rhbz#1263359). Double free vulnerability in the opj_j2k_copy_default_tcp_and_create_tcd function in j2k.c in OpenJPEG allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering a memory-allocation failure (CVE-2015-6581).

OSVersionArchitecturePackageVersionFilename
Mageia5noarchopenjpeg2< 2.1.0-3.2openjpeg2-2.1.0-3.2.mga5

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.042 Low

EPSS

Percentile

92.2%