Bug 27101 - openjpeg: Memory Corruption (3.0)
openjpeg: Memory Corruption (3.0)
Status: CLOSED WONTFIX
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.0
Other Linux
: P4 normal (vote)
: UCS 3.0-x-errata
Assigned To: Security maintainers
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2012-05-11 16:03 CEST by Moritz Muehlenhoff
Modified: 2019-04-11 19:23 CEST (History)
0 users

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2012-05-11 16:03:48 CEST
CVE-2009-5030 (Die CVE-ID ist von 2009, wurde aber erst kürzlich zugewiesen)

Memory Corruption in der Umwandlung nach JPEG2000 erlaubt das Ausführen von Schadcode.
Comment 1 Moritz Muehlenhoff univentionstaff 2012-07-12 10:14:03 CEST
Bufferoverflow (CVE-2012-3358)
Comment 2 Moritz Muehlenhoff univentionstaff 2012-08-27 08:44:13 CEST
\item Bufferoverflow in der Verarbeitung von JPEG2000-Bildern (CVE-2012-3535)
Comment 3 Moritz Muehlenhoff univentionstaff 2013-07-01 08:27:00 CEST
The maintenance with bug and security fixes for UCS 3.0-x has ended on 30th June 2013. 

The maintenance of the UCS 3.x major series is continued by UCS 3.1-x that is
supplied with bug and security fixes.

Customers still on UCS 3.0-x are encouraged to update to UCS 3.1 that contains,
among other things, Linux Kernel 3.2, Univention App Center, an update of Samba
3 and Samba 4, support for Microsoft Windows 2012 and Windows 8. Please contact
your partner or Univention for any questions.