Openjpeg2 security update to version 2.4.0-4 includes fixes for Covscan defect and CVE-2021-3575
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Moderate: openjpeg2 security update | 9 Nov 202108:51 | – | osv |
![]() | Moderate: openjpeg2 security update | 9 Nov 202108:51 | – | osv |
![]() | Red Hat Security Advisory: openjpeg2 security update | 16 Sep 202406:03 | – | osv |
![]() | openjpeg2 vulnerabilities | 7 Jan 202113:59 | – | osv |
![]() | openjpeg2 vulnerabilities | 15 Mar 202311:56 | – | osv |
![]() | openjpeg2 - security update | 1 Apr 202100:00 | – | osv |
![]() | openjpeg2 - security update | 9 Feb 202100:00 | – | osv |
![]() | openjpeg2 vulnerabilities | 16 Mar 202110:32 | – | osv |
![]() | ghostscript vulnerabilities | 7 Jan 202114:10 | – | osv |
![]() | openjpeg2 - security update | 10 Apr 202200:00 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
oracle linux | 8 | src | openjpeg2 | 2.4.0-4.el8 | openjpeg2-2.4.0-4.el8.src.rpm |
oracle linux | 8 | aarch64 | openjpeg2 | 2.4.0-4.el8 | openjpeg2-2.4.0-4.el8.aarch64.rpm |
oracle linux | 8 | aarch64 | openjpeg2-devel | 2.4.0-4.el8 | openjpeg2-devel-2.4.0-4.el8.aarch64.rpm |
oracle linux | 8 | noarch | openjpeg2-devel-docs | 2.4.0-4.el8 | openjpeg2-devel-docs-2.4.0-4.el8.noarch.rpm |
oracle linux | 8 | aarch64 | openjpeg2-tools | 2.4.0-4.el8 | openjpeg2-tools-2.4.0-4.el8.aarch64.rpm |
oracle linux | 8 | src | openjpeg2 | 2.4.0-4.el8 | openjpeg2-2.4.0-4.el8.src.rpm |
oracle linux | 8 | i686 | openjpeg2 | 2.4.0-4.el8 | openjpeg2-2.4.0-4.el8.i686.rpm |
oracle linux | 8 | x86_64 | openjpeg2 | 2.4.0-4.el8 | openjpeg2-2.4.0-4.el8.x86_64.rpm |
oracle linux | 8 | i686 | openjpeg2-devel | 2.4.0-4.el8 | openjpeg2-devel-2.4.0-4.el8.i686.rpm |
oracle linux | 8 | x86_64 | openjpeg2-devel | 2.4.0-4.el8 | openjpeg2-devel-2.4.0-4.el8.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo