MGASA-2017-0122

Source
https://advisories.mageia.org/MGASA-2017-0122.html
Import Source
https://advisories.mageia.org/MGASA-2017-0122.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0122
Related
Published
2017-05-02T06:37:59Z
Modified
2017-05-02T06:27:53Z
Summary
Updated openjpeg packages fix security vulnerability
Details

Multiple integer overflows in the opjtcdinit_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data. (CVE-2016-5139)

Multiple integer overflows in the opjtcdinit_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data. (CVE-2016-5158)

Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during opjalignedmalloc calls in dwt.c and t1.c. (CVE-2016-5159)

Integer overflow in the opjpicreate_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write. (CVE-2016-7163)

An out-of-bounds read vulnerability was found in OpenJPEG, in the j2ktoimage tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap. (CVE-2016-9573

References
Credits

Affected packages

Mageia:5 / openjpeg

Package

Name
openjpeg
Purl
pkg:rpm/mageia/openjpeg?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.2-5.2.mga5

Ecosystem specific

{
    "section": "core"
}