MGASA-2015-0398

Source
https://advisories.mageia.org/MGASA-2015-0398.html
Import Source
https://advisories.mageia.org/MGASA-2015-0398.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0398
Related
Published
2015-10-13T22:40:25Z
Modified
2015-10-13T22:35:37Z
Summary
Updated openjpeg2 package fixes security vulnerability
Details

Use-after-free vulnerability was found in j2k.c in opjj2kwrite_mco function (rhbz#1263359).

Double free vulnerability in the opjj2kcopydefaulttcpandcreate_tcd function in j2k.c in OpenJPEG allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering a memory-allocation failure (CVE-2015-6581).

References
Credits

Affected packages

Mageia:5 / openjpeg2

Package

Name
openjpeg2
Purl
pkg:rpm/mageia/openjpeg2?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0-3.2.mga5

Ecosystem specific

{
    "section": "core"
}