Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2022.0129
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2022-0129)
Zusammenfassung:The remote host is missing an update for the 'openjpeg2' package(s) announced via the MGASA-2022-0129 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'openjpeg2' package(s) announced via the MGASA-2022-0129 advisory.

Vulnerability Insight:
A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the
way it handles an input directory with a large number of files. When it
fails to allocate a buffer to store the filenames of the input directory,
it calls free() on an uninitialized pointer, leading to a segmentation
fault and a denial of service. (CVE-2022-1122)

Affected Software/OS:
'openjpeg2' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2022-1122
FEDORA-2022-2d112d4480
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MIWSQFQWXDU4MT3XTVAO6HC7TVL3NHS7/
FEDORA-2022-9515529c96
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROSN5NRUFOH7HGLJ4ZSKPGAKLFXJALW4/
FEDORA-2022-975e21444a
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMKBAMK2CAM5TMC5TODKVCE5AAPTD5YV/
GLSA-202209-04
https://security.gentoo.org/glsa/202209-04
[debian-lts-announce] 20220410 [SECURITY] [DLA 2975-1] openjpeg2 security update
https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html
https://github.com/uclouvain/openjpeg/issues/1368
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.