Revision Date: | 2018-03-02 | Version: | 1 | Title: | CVE-2018-7648 on Ubuntu 16.04 LTS (xenial) - medium. | Description: | An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2018-7648
| Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT libopenjp2-7 package in xenial, while related to the CVE in some way, is not affected (note: 'code not built').
OR NOT libopenjp2-tools package in xenial, while related to the CVE in some way, is not affected (note: 'code not built').
OR NOT libopenjp3d-tools package in xenial, while related to the CVE in some way, is not affected (note: 'code not built').
OR NOT libopenjp3d7 package in xenial, while related to the CVE in some way, is not affected (note: 'code not built').
OR NOT libopenjpip-dec-server package in xenial, while related to the CVE in some way, is not affected (note: 'code not built').
OR NOT libopenjpip-server package in xenial, while related to the CVE in some way, is not affected (note: 'code not built').
OR NOT libopenjpip-viewer package in xenial, while related to the CVE in some way, is not affected (note: 'code not built').
OR NOT libopenjpip7 package in xenial, while related to the CVE in some way, is not affected (note: 'code not built').
|
|