openSUSE-SU-2016:2833-1: moderate: Security update for jasper
openSUSE Security Update: Security update for jasper ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2833-1 Rating: moderate References: #1005084 #1005090 #1005242 #1006591 #1006593 #1006597 #1006598 #1006599 #1006836 #1006839 #1007009 #392410 #941919 #942553 #961886 #963983 #968373 Cross-References: CVE-2008-3522 CVE-2014-8158 CVE-2015-5203 CVE-2015-5221 CVE-2016-1577 CVE-2016-1867 CVE-2016-2089 CVE-2016-2116 CVE-2016-8690 CVE-2016-8691 CVE-2016-8692 CVE-2016-8693 CVE-2016-8880 CVE-2016-8881 CVE-2016-8882 CVE-2016-8883 CVE-2016-8884 CVE-2016-8885 CVE-2016-8886 CVE-2016-8887 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes 20 vulnerabilities is now available. Description: This update for jasper to version 1.900.14 fixes several issues. These security issues were fixed: - CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (bsc#1006836) - CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599) - CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009) - CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598) - CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy (bsc#1006597) - CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593) - CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591) - CVE-2016-8693 Double free vulnerability in mem_close (bsc#1005242) - CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz (bsc#1005090) - CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084) - CVE-2016-2116: Memory leak in the jas_iccprof_createfrombuf function in JasPer allowed remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file (bsc#968373) - CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983) - CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886) - CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553). - CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919) - CVE-2008-3522: Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer might have allowed context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf (bsc#392410) - jasper: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (incomplete fix for CVE-2016-8887) (bsc#1006839) For additional change description please have a look at the changelog. This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2016-1309=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-1309=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): jasper-1.900.14-167.1 jasper-debuginfo-1.900.14-167.1 jasper-debugsource-1.900.14-167.1 libjasper-devel-1.900.14-167.1 libjasper1-1.900.14-167.1 libjasper1-debuginfo-1.900.14-167.1 - openSUSE Leap 42.2 (x86_64): libjasper1-32bit-1.900.14-167.1 libjasper1-debuginfo-32bit-1.900.14-167.1 - openSUSE Leap 42.1 (i586 x86_64): jasper-1.900.14-166.1 jasper-debuginfo-1.900.14-166.1 jasper-debugsource-1.900.14-166.1 libjasper-devel-1.900.14-166.1 libjasper1-1.900.14-166.1 libjasper1-debuginfo-1.900.14-166.1 - openSUSE Leap 42.1 (x86_64): libjasper1-32bit-1.900.14-166.1 libjasper1-debuginfo-32bit-1.900.14-166.1 References: https://www.suse.com/security/cve/CVE-2008-3522.html https://www.suse.com/security/cve/CVE-2014-8158.html https://www.suse.com/security/cve/CVE-2015-5203.html https://www.suse.com/security/cve/CVE-2015-5221.html https://www.suse.com/security/cve/CVE-2016-1577.html https://www.suse.com/security/cve/CVE-2016-1867.html https://www.suse.com/security/cve/CVE-2016-2089.html https://www.suse.com/security/cve/CVE-2016-2116.html https://www.suse.com/security/cve/CVE-2016-8690.html https://www.suse.com/security/cve/CVE-2016-8691.html https://www.suse.com/security/cve/CVE-2016-8692.html https://www.suse.com/security/cve/CVE-2016-8693.html https://www.suse.com/security/cve/CVE-2016-8880.html https://www.suse.com/security/cve/CVE-2016-8881.html https://www.suse.com/security/cve/CVE-2016-8882.html https://www.suse.com/security/cve/CVE-2016-8883.html https://www.suse.com/security/cve/CVE-2016-8884.html https://www.suse.com/security/cve/CVE-2016-8885.html https://www.suse.com/security/cve/CVE-2016-8886.html https://www.suse.com/security/cve/CVE-2016-8887.html https://bugzilla.suse.com/1005084 https://bugzilla.suse.com/1005090 https://bugzilla.suse.com/1005242 https://bugzilla.suse.com/1006591 https://bugzilla.suse.com/1006593 https://bugzilla.suse.com/1006597 https://bugzilla.suse.com/1006598 https://bugzilla.suse.com/1006599 https://bugzilla.suse.com/1006836 https://bugzilla.suse.com/1006839 https://bugzilla.suse.com/1007009 https://bugzilla.suse.com/392410 https://bugzilla.suse.com/941919 https://bugzilla.suse.com/942553 https://bugzilla.suse.com/961886 https://bugzilla.suse.com/963983 https://bugzilla.suse.com/968373
participants (1)
-
opensuse-security@opensuse.org