MGASA-2017-0481

Source
https://advisories.mageia.org/MGASA-2017-0481.html
Import Source
https://advisories.mageia.org/MGASA-2017-0481.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2017-0481
Related
Published
2017-12-31T15:14:43Z
Modified
2017-12-31T14:49:20Z
Summary
Updated openjpeg2 packages fix security vulnerability
Details

A heap-based buffer overflow was discovered in the opjt2encode_packet function. The vulnerability caused an out-of-bounds write, which may have lead to remote denial of service or possibly unspecified other impact (CVE-2017-14039).

An invalid write access was discovered in bin/jp2/convert.c, triggering a crash in the tgatoimage function. The vulnerability may have lead to remote denial of service or possibly unspecified other impact (CVE-2017-14040).

A stack-based buffer overflow was discovered in the pgxtoimage function. The vulnerability caused an out-of-bounds write, which may have lead to remote denial of service or possibly remote code execution (CVE-2017-14041).

A size-validation issue was discovered in opjj2kwrite_sot. The vulnerability caused an out-of-bounds write, which may have lead to remote DoS or possibly remote code execution (CVE-2017-14164).

References
Credits

Affected packages