Critical Security Update for Openjpeg Addresses Buffer Overflow
Summary
Here are the details from the Slackware 15.0 ChangeLog: patches/packages/openjpeg-2.5.1-i586-1_slack15.0.txz: Upgraded. Fixed a heap-based buffer overflow in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg. For more information, see: https://www.cve.org/CVERecord?id=CVE-2021-3575 (* Security fix *)
Where Find New Packages
Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.
Updated package for Slackware 15.0:
Updated package for Slackware x86_64 15.0:
Updated package for Slackware -current:
Updated package for Slackware x86_64 -current:
MD5 Signatures
Slackware 15.0 package:
b48dde1596a6bbd4ff17853d6305f5d9 openjpeg-2.5.1-i586-1_slack15.0.txz
Slackware x86_64 15.0 package:
953919aa0e6828dc2edff548e4643a10 openjpeg-2.5.1-x86_64-1_slack15.0.txz
Slackware -current package:
6ad0d352dbc55d1b5e3d5ffc0b518d41 l/openjpeg-2.5.1-i586-1.txz
Slackware x86_64 -current package:
f4db01328ea44fa02c8bc8c31661f795 l/openjpeg-2.5.1-x86_64-1.txz
Installation Instructions
Installation instructions: Upgrade the package as root: # upgradepkg openjpeg-2.5.1-i586-1_slack15.0.txz