openjpeg-1.5.1-16.el7
エラータID: AXSA:2017-1532:01
OpenJPEG is an open-source JPEG 2000 codec written in C. It has been
developed in order to promote the use of JPEG 2000, the new still-image
compression standard from the Joint Photographic Experts Group (JPEG).
Security issues fixed with this release:
CVE-2016-5139
Multiple integer overflows in the opj_tcd_init_tile function in tcd.c
in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116,
allow remote attackers to cause a denial of service (heap-based buffer
overflow) or possibly have unspecified other impact via crafted JPEG
2000 data.
CVE-2016-5158
Multiple integer overflows in the opj_tcd_init_tile function in tcd.c
in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on
Windows and OS X and before 53.0.2785.92 on Linux, allow remote
attackers to cause a denial of service (heap-based buffer overflow) or
possibly have unspecified other impact via crafted JPEG 2000 data.
CVE-2016-5159
Multiple integer overflows in OpenJPEG, as used in PDFium in Google
Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92
on Linux, allow remote attackers to cause a denial of service
(heap-based buffer overflow) or possibly have unspecified other impact
via crafted JPEG 2000 data that is mishandled during
opj_aligned_malloc calls in dwt.c and t1.c.
CVE-2016-7163
Integer overflow in the opj_pi_create_decode function in pi.c in
OpenJPEG allows remote attackers to execute arbitrary code via a
crafted JP2 file, which triggers an out-of-bounds read or write.
CVE-2016-9573
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2016-9675
openjpeg: A heap-based buffer overflow flaw was found in the patch for
CVE-2013-6045. A crafted j2k image could cause the application to
crash, or potentially execute arbitrary code.
Update package.
Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.
Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.
Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during opj_aligned_malloc calls in dwt.c and t1.c.
Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write.
An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap.
openjpeg: A heap-based buffer overflow flaw was found in the patch for CVE-2013-6045. A crafted j2k image could cause the application to crash, or potentially execute arbitrary code.
N/A
SRPMS
- openjpeg-1.5.1-16.el7.src.rpm
MD5: df188eda4ca047190522efc683c2f334
SHA-256: 754c934b7f6f08777cd8ba34babcab68d0443ec7ac703bffe89ffeae20c4c240
Size: 2.04 MB
Asianux Server 7 for x86_64
- openjpeg-libs-1.5.1-16.el7.x86_64.rpm
MD5: c8a038aebf7b6d2132790cbe528f6b7d
SHA-256: 6e7494569e59ec192f66d08a7233b837262ec5fd3edc478ee18eb0ec734d550c
Size: 85.01 kB - openjpeg-libs-1.5.1-16.el7.i686.rpm
MD5: fd33f639c83bcb58f97e083eaeaf5b50
SHA-256: 834b1580b3df3b47179ca8aab1e18ed2010d9e118d9e87334f049c9604e23b13
Size: 83.66 kB