Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 628418 (CVE-2016-9115) - media-libs/openjpeg: Heap Buffer Overflow in function imagetotga of convert.c(jp2) (CVE-2016-9115)
Summary: media-libs/openjpeg: Heap Buffer Overflow in function imagetotga of convert.c...
Status: RESOLVED INVALID
Alias: CVE-2016-9115
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://github.com/uclouvain/openjpeg...
Whiteboard: B3 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-08-20 18:53 UTC by GLSAMaker/CVETool Bot
Modified: 2017-08-21 07:30 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2017-08-20 18:53:45 UTC
CVE-2016-9115 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9115):
  Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in
  OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k
  file.
Comment 1 Thomas Deutschmann gentoo-dev Security 2017-08-20 19:01:01 UTC
Affects CLI tool only.
Comment 2 Agostino Sarubbo gentoo-dev 2017-08-21 07:30:31 UTC
As said multiple times by mitre, a read overflow in a command-line tool where no library are involved is considered an inconvenience instead of a security issue.