Updated openjpeg2 packages fix security vulnerability
Publication date: 31 Dec 2017Modification date: 31 Dec 2017
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-14039 , CVE-2017-14040 , CVE-2017-14041 , CVE-2017-14164
Description
A heap-based buffer overflow was discovered in the opj_t2_encode_packet function. The vulnerability caused an out-of-bounds write, which may have lead to remote denial of service or possibly unspecified other impact (CVE-2017-14039). An invalid write access was discovered in bin/jp2/convert.c, triggering a crash in the tgatoimage function. The vulnerability may have lead to remote denial of service or possibly unspecified other impact (CVE-2017-14040). A stack-based buffer overflow was discovered in the pgxtoimage function. The vulnerability caused an out-of-bounds write, which may have lead to remote denial of service or possibly remote code execution (CVE-2017-14041). A size-validation issue was discovered in opj_j2k_write_sot. The vulnerability caused an out-of-bounds write, which may have lead to remote DoS or possibly remote code execution (CVE-2017-14164).
References
- https://bugs.mageia.org/show_bug.cgi?id=21627
- https://lists.opensuse.org/opensuse-updates/2017-10/msg00032.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14164
SRPMS
6/core
- openjpeg2-2.2.0-1.2.mga6
5/core
- openjpeg2-2.2.0-1.2.mga5