EulerOS 2.0 SP8 : openjpeg2 (EulerOS-SA-2019-1775)
High Nessus Plugin ID 127012
SynopsisThe remote EulerOS host is missing multiple security updates.
DescriptionAccording to the versions of the openjpeg2 package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :
- An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line.(CVE-2018-7648)
- In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtovolume function in jp3d/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.(CVE-2017-17480)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpdate the affected openjpeg2 packages.