First published: Thu May 12 2016(Updated: )
A heap buffer overflow in function color_cmyk_to_rgb in color.c. Upstream patch: <a href="https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91">https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91</a> CVE request: <a href="http://seclists.org/oss-sec/2016/q2/327">http://seclists.org/oss-sec/2016/q2/327</a>
Affected Software | Affected Version | How to fix |
---|---|---|
uclouvain openjpeg |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1335482 is categorized as high due to the potential for a heap buffer overflow which may lead to code execution.
To fix REDHAT-BUG-1335482, apply the upstream patch provided in the commit for the uclouvain openjpeg library.
The impact of REDHAT-BUG-1335482 includes possible unauthorized access, data corruption, or execution of arbitrary code.
Users of the uclouvain openjpeg library are affected by REDHAT-BUG-1335482, especially those using vulnerable versions.
Currently, the recommended resolution for REDHAT-BUG-1335482 is to apply the patch, and no effective workaround has been documented.