Mailinglist Archive: opensuse-updates (131 mails)

< Previous Next >
openSUSE-SU-2016:2722-1: moderate: Security update for jasper
openSUSE Security Update: Security update for jasper
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:2722-1
Rating: moderate
References: #1005084 #1005090 #1005242 #1006591 #1006593
#1006597 #1006598 #1006599 #392410 #941919
#942553 #968373
Cross-References: CVE-2008-3522 CVE-2015-5203 CVE-2015-5221
CVE-2016-1577 CVE-2016-2116 CVE-2016-8690
CVE-2016-8691 CVE-2016-8692 CVE-2016-8693
CVE-2016-8880 CVE-2016-8881 CVE-2016-8882
CVE-2016-8883 CVE-2016-8886
Affected Products:
openSUSE 13.2
______________________________________________________________________________

An update that fixes 14 vulnerabilities is now available.

Description:


This update for jasper to version 1.900.14 fixes several issues.

These security issues were fixed:

- CVE-2008-3522: Buffer overflow in the jas_stream_printf function in
libjasper/base/jas_stream.c in JasPer might have allowed
context-dependent attackers to have an unknown impact via vectors
related to the mif_hdr_put function and use of vsprintf (bsc#392410)
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation
(bsc#941919).
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200
(bsc#942553).
- CVE-2016-1577: Double free vulnerability in the jas_iccattrval_destroy
function in JasPer allowed remote attackers to cause a denial of service
(crash) or possibly execute arbitrary code via a crafted ICC color
profile in a JPEG 2000 image file, a different vulnerability than
CVE-2014-8137 (bsc#968373).
- CVE-2016-2116: Memory leak in the jas_iccprof_createfrombuf function in
JasPer allowed remote attackers to cause a denial of service (memory
consumption) via a crafted ICC color profile in a JPEG 2000 image file
(bsc#968373)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by
crafted BMP image (bsc#1005084).
- CVE-2016-8691, CVE-2016-8692: Missing range check on XRsiz and YRsiz
fields of SIZ marker segment (bsc#1005090).
- CVE-2016-8693: The memory stream interface allowed for a buffer size of
zero. The case of a zero-sized buffer was not handled correctly, as it
could lead to a double free (bsc#1005242).
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591).
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593).
- CVE-2016-8882: Null pointer access in jpc_pi_destroy (bsc#1006597).
- CVE-2016-8883: Assert triggered in jpc_dec_tiledecode() (bsc#1006598).
- CVE-2016-8886: Memory allocation failure in jas_malloc (jas_malloc.c)
(bsc#1006599).

For additional change description please have a look at the changelog.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2016-1263=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.2 (i586 x86_64):

jasper-1.900.14-163.24.1
jasper-debuginfo-1.900.14-163.24.1
jasper-debugsource-1.900.14-163.24.1
libjasper-devel-1.900.14-163.24.1
libjasper1-1.900.14-163.24.1
libjasper1-debuginfo-1.900.14-163.24.1

- openSUSE 13.2 (x86_64):

libjasper1-32bit-1.900.14-163.24.1
libjasper1-debuginfo-32bit-1.900.14-163.24.1


References:

https://www.suse.com/security/cve/CVE-2008-3522.html
https://www.suse.com/security/cve/CVE-2015-5203.html
https://www.suse.com/security/cve/CVE-2015-5221.html
https://www.suse.com/security/cve/CVE-2016-1577.html
https://www.suse.com/security/cve/CVE-2016-2116.html
https://www.suse.com/security/cve/CVE-2016-8690.html
https://www.suse.com/security/cve/CVE-2016-8691.html
https://www.suse.com/security/cve/CVE-2016-8692.html
https://www.suse.com/security/cve/CVE-2016-8693.html
https://www.suse.com/security/cve/CVE-2016-8880.html
https://www.suse.com/security/cve/CVE-2016-8881.html
https://www.suse.com/security/cve/CVE-2016-8882.html
https://www.suse.com/security/cve/CVE-2016-8883.html
https://www.suse.com/security/cve/CVE-2016-8886.html
https://bugzilla.suse.com/1005084
https://bugzilla.suse.com/1005090
https://bugzilla.suse.com/1005242
https://bugzilla.suse.com/1006591
https://bugzilla.suse.com/1006593
https://bugzilla.suse.com/1006597
https://bugzilla.suse.com/1006598
https://bugzilla.suse.com/1006599
https://bugzilla.suse.com/392410
https://bugzilla.suse.com/941919
https://bugzilla.suse.com/942553
https://bugzilla.suse.com/968373


< Previous Next >
This Thread
  • No further messages