Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 628418 (CVE-2016-9115)

Summary: media-libs/openjpeg: Heap Buffer Overflow in function imagetotga of convert.c(jp2) (CVE-2016-9115)
Product: Gentoo Security Reporter: GLSAMaker/CVETool Bot <glsamaker>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED INVALID    
Severity: minor CC: graphics+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://github.com/uclouvain/openjpeg/issues/858
See Also: https://bugs.gentoo.org/show_bug.cgi?id=602180
Whiteboard: B3 [upstream]
Package list:
Runtime testing required: ---

Description GLSAMaker/CVETool Bot gentoo-dev 2017-08-20 18:53:45 UTC
CVE-2016-9115 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9115):
  Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in
  OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k
  file.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2017-08-20 19:01:01 UTC
Affects CLI tool only.
Comment 2 Agostino Sarubbo gentoo-dev 2017-08-21 07:30:31 UTC
As said multiple times by mitre, a read overflow in a command-line tool where no library are involved is considered an inconvenience instead of a security issue.