Name | CVE-2016-4796 |
Description | Heap-based buffer overflow in the color_cmyk_to_rgb in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (crash) via a crafted .j2k file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
openjpeg2 (PTS) | bullseye | 2.4.0-3 | fixed |
| bookworm, sid, trixie | 2.5.0-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
openjpeg | source | wheezy | (not affected) | | | |
openjpeg | source | jessie | (not affected) | | | |
openjpeg | source | (unstable) | (unfixed) | | | |
openjpeg2 | source | jessie | (not affected) | | | |
openjpeg2 | source | (unstable) | 2.1.1-1 | | | |
Notes
[jessie] - openjpeg2 <not-affected> (Vulnerable code not yet present in 2.1.0)
[jessie] - openjpeg <not-affected> (Vulnerable code not present)
[wheezy] - openjpeg <not-affected> (Vulnerable code not present)
https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91