MGASA-2021-0292 - Updated openjpeg2 packages fix a security vulnerability

Publication date: 28 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0292.html
Type: security
Affected Mageia releases: 7, 8
CVE: CVE-2021-3575

A heap-based buffer overflow was found in openjpeg. An attacker could use this
to execute arbitrary code with the permissions of the application compiled
against openjpeg (CVE-2021-3575).

References:
- https://bugs.mageia.org/show_bug.cgi?id=29127
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BCRXAQJZ7774QPW344OO7IBQX5PPDZ7O/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575

SRPMS:
- 8/core/openjpeg2-2.4.0-1.2.mga8
- 7/core/openjpeg2-2.4.0-1.2.mga7

Mageia 2021-0292: openjpeg2 security update

A heap-based buffer overflow was found in openjpeg

Summary

A heap-based buffer overflow was found in openjpeg. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg (CVE-2021-3575).

References

- https://bugs.mageia.org/show_bug.cgi?id=29127

- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BCRXAQJZ7774QPW344OO7IBQX5PPDZ7O/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575

Resolution

MGASA-2021-0292 - Updated openjpeg2 packages fix a security vulnerability

SRPMS

- 8/core/openjpeg2-2.4.0-1.2.mga8

- 7/core/openjpeg2-2.4.0-1.2.mga7

Severity
Publication date: 28 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0292.html
Type: security
CVE: CVE-2021-3575

Related News