Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP5:GA
patchinfo.7252
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.7252
<patchinfo incident="7252"> <issue id="1072124" tracker="bnc">VUL-0: CVE-2017-17480: openjpeg2: Stack-based buffer overflow in the pgxtovolume function in jp3d/convert.c</issue> <issue id="1072125" tracker="bnc">VUL-0: CVE-2017-17479: openjpeg2: Stack-based buffer overflow in the pgxtoimage function in jpwl/convert.c</issue> <issue id="1066713" tracker="bnc">VUL-0: CVE-2015-1239: openjpeg2: Double free vulnerability in the j2k_read_ppm_v3 function allows remote attackers to cause DoS</issue> <issue id="2017-17479" tracker="cve" /> <issue id="2017-171479" tracker="cve" /> <issue id="2015-1239" tracker="cve" /> <issue id="2017-17480" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>hpjansson</packager> <description>This update for openjpeg2 fixes the following security issues: - CVE-2015-1239: A double free vulnerability in the j2k_read_ppm_v3 function allowed remote attackers to cause a denial of service (crash) (bsc#1066713) - CVE-2017-17479: A stack-based buffer overflow in the pgxtoimage function in jpwl/convert.c could crash the converter. (bsc#1072125) - CVE-2017-17480: A stack-based buffer overflow in the pgxtovolume function in jp3d/convert.c could crash the converter. (bsc#1072124) </description> <summary>Security update for openjpeg2</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor