Lucene search

K
mageiaGentoo FoundationMGASA-2016-0426
HistoryDec 29, 2016 - 1:29 p.m.

Updated openjpeg2 packages fix security vulnerabilities

2016-12-2913:29:11
Gentoo Foundation
advisories.mageia.org
14

0.006 Low

EPSS

Percentile

77.9%

A NULL pointer dereference flaw was found in the way openjpeg decoded certain input images. Due to a logic error in the code responsible for decoding the input image, an application using openjpeg to process image data could crash when processing a crafted image (CVE-2016-9572). A heap buffer overflow flaw was found in the way openjpeg decompressed certain input images. Due to an insufficient check in the imagetopnm() function, an application using openjpeg to process image data could crash when processing a crafted image (CVE-2016-9573). An integer overflow vulnerability was found in tiftoimage function resulting into heap buffer overflow (CVE-2016-9580). An infinite loop vulnerability in tiftoimage that results into heap buffer overflow in convert_32s_C1P1 was found (CVE-2016-9581)

OSVersionArchitecturePackageVersionFilename
Mageia5noarchopenjpeg2< 2.1.2-1.1openjpeg2-2.1.2-1.1.mga5