[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2017:2649-1 -- SLES libopenjp, openjpeg2-debuginfo, openjpeg2-debugsource

ID: oval:org.secpod.oval:def:89044998Date: (C)2021-07-20   (M)2024-01-02
Class: PATCHFamily: unix




This update for openjpeg2 fixes several issues. These security issues were fixed: - CVE-2016-10507: Integer overflow vulnerability in the bmp24toimage function allowed remote attackers to cause a denial of service via a crafted bmp file . - CVE-2017-14039: A heap-based buffer overflow was discovered in the opj_t2_encode_packet function. The vulnerability caused an out-of-bounds write, which may have lead to remote denial of service or possibly unspecified other impact . - CVE-2017-14164: A size-validation issue was discovered in opj_j2k_write_sot. The vulnerability caused an out-of-bounds write, which may have lead to remote DoS or possibly remote code execution . - CVE-2017-14040: An invalid write access was discovered in bin/jp2/convert.c, triggering a crash in the tgatoimage function. The vulnerability may have lead to remote denial of service or possibly unspecified other impact . - CVE-2017-14041: A stack-based buffer overflow was discovered in the pgxtoimage function. The vulnerability caused an out-of-bounds write, which may have lead to remote denial of service or possibly remote code execution .

Platform:
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP2
Product:
libopenjp
openjpeg2-debuginfo
openjpeg2-debugsource
Reference:
SUSE-SU-2017:2649-1
CVE-2016-10507
CVE-2017-14039
CVE-2017-14040
CVE-2017-14041
CVE-2017-14164
CVE    5
CVE-2016-10507
CVE-2017-14039
CVE-2017-14164
CVE-2017-14041
...
CPE    5
cpe:/o:suse:suse_linux_enterprise_server:12:sp3
cpe:/o:suse:suse_linux_enterprise_server:12:sp2
cpe:/a:libopenjp:libopenjp
cpe:/a:openjpeg2-debugsource:openjpeg2-debugsource
...

© SecPod Technologies