Commit eed54630 authored by Sebul's avatar Sebul

OpenJpeg2

parent 0d3c2859
#use wml::debian::translation-check translation="da347ceee9cca800740ef75deed5e600ef8e2b1d" maintainer="Sebul"
<define-tag description>보안 업데이트</define-tag>
<define-tag moreinfo>
<p>여러 가지 취약점이 오픈 소스 JPEG 2000 코덱인 openjpeg2에서 발견, 서비스 거부 또는 원격 코드 실행을 야기 할 수있는 것을 발견했습니다.
</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17480">CVE-2017-17480</a>
<p>Write stack buffer overflow in the jp3d and jpwl codecs can result
in a denial of service or remote code execution via a crafted jp3d
or jpwl file.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5785">CVE-2018-5785</a>
<p>Integer overflow can result in a denial of service via a crafted bmp
file.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6616">CVE-2018-6616</a>
<p>Excessive iteration can result in a denial of service via a crafted
bmp file.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-14423">CVE-2018-14423</a>
<p>Division-by-zero vulnerabilities can result in a denial of service via
a crafted j2k file.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18088">CVE-2018-18088</a>
<p>Null pointer dereference can result in a denial of service via a
crafted bmp file.</p></li>
</ul>
<p>안정 배포(오픈 소스 JPEG 2000 코덱 인 openjpeg2에서)에서 이 문제를 버전 2.1.2-1.1+deb9u3에서 고쳤습니다.
</p>
<p>openjpeg2 패키지를 업그레이드 하는 게 좋습니다.
</p>
<p>openjpeg2의 자세한 보안 상태는 보안 추적 페이지 참조:
<a href="https://security-tracker.debian.org/tracker/openjpeg2">\
https://security-tracker.debian.org/tracker/openjpeg2</a></p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/security/2019/dsa-4405.data"
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment