{"id":"MGASA-2015-0398","summary":"Updated openjpeg2 package fixes security vulnerability","details":"Use-after-free vulnerability was found in j2k.c in opj_j2k_write_mco\nfunction (rhbz#1263359).\n\nDouble free vulnerability in the opj_j2k_copy_default_tcp_and_create_tcd\nfunction in j2k.c in OpenJPEG allows remote attackers to execute arbitrary\ncode or cause a denial of service (heap memory corruption) by triggering a\nmemory-allocation failure (CVE-2015-6581).\n","modified":"2026-04-16T06:24:21.377569933Z","published":"2015-10-13T22:40:25Z","upstream":["CVE-2015-6581"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0398.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=16880"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2015-October/168012.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2015-October/168736.html"}],"affected":[{"package":{"name":"openjpeg2","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/openjpeg2?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.0-3.2.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0398.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}