Summary: | media-libs/openjpeg: Heap Buffer Overflow in function imagetotga of convert.c(jp2) (CVE-2016-9115) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | GLSAMaker/CVETool Bot <glsamaker> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | minor | CC: | graphics+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://github.com/uclouvain/openjpeg/issues/858 | ||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=602180 | ||
Whiteboard: | B3 [upstream] | ||
Package list: | Runtime testing required: | --- |
Description
GLSAMaker/CVETool Bot
2017-08-20 18:53:45 UTC
Affects CLI tool only. As said multiple times by mitre, a read overflow in a command-line tool where no library are involved is considered an inconvenience instead of a security issue. |