MGASA-2022-0129

Source
https://advisories.mageia.org/MGASA-2022-0129.html
Import Source
https://advisories.mageia.org/MGASA-2022-0129.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0129
Related
Published
2022-04-02T22:22:09Z
Modified
2022-04-02T21:35:20Z
Summary
Updated openjpeg2 packages fix security vulnerability
Details

A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service. (CVE-2022-1122)

References
Credits

Affected packages

Mageia:8 / openjpeg2

Package

Name
openjpeg2
Purl
pkg:rpm/mageia/openjpeg2?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.0-1.3.mga8

Ecosystem specific

{
    "section": "core"
}