openSUSE: 2020:1523-1: moderate: jasper
Description
This update for jasper fixes the following issues: - CVE-2016-9398: Improved patch for already fixed issue (bsc#1010979). - CVE-2016-9399: Fix assert in calcstepsizes (bsc#1010980). - CVE-2017-5499: Validate component depth bit (bsc#1020451). - CVE-2017-5503: Check bounds in jas_seq2d_bindsub() (bsc#1020456). - CVE-2017-5504: Check bounds in jas_seq2d_bindsub() (bsc#1020458). - CVE-2017-5505: Check bounds in jas_seq2d_bindsub() (bsc#1020460). - CVE-2017-14132: Fix heap base overflow in by checking components (bsc#1057152). - CVE-2018-9252: Fix reachable assertion in jpc_abstorelstepsize (bsc#1088278). - CVE-2018-18873: Fix null pointer deref in ras_putdatastd (bsc#1114498). - CVE-2018-19139: Fix mem leaks by registering jpc_unk_destroyparms (bsc#1115637). - CVE-2018-19543, bsc#1045450 CVE-2017-9782: Fix numchans mixup (bsc#1117328). - CVE-2018-20570: Fix heap based buffer over-read in jp2_encode (bsc#1120807). - CVE-2018-20622: Fix memory leak in jas_malloc.c (bsc#1120805). This update was imported from the SUSE:SLE-15:Update update project.
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2020-1523=1
Package List
- openSUSE Leap 15.2 (i586 x86_64): jasper-2.0.14-lp152.7.3.1 jasper-debuginfo-2.0.14-lp152.7.3.1 jasper-debugsource-2.0.14-lp152.7.3.1 libjasper-devel-2.0.14-lp152.7.3.1 libjasper4-2.0.14-lp152.7.3.1 libjasper4-debuginfo-2.0.14-lp152.7.3.1 - openSUSE Leap 15.2 (x86_64): libjasper4-32bit-2.0.14-lp152.7.3.1 libjasper4-32bit-debuginfo-2.0.14-lp152.7.3.1
References
https://www.suse.com/security/cve/CVE-2016-9398.html https://www.suse.com/security/cve/CVE-2016-9399.html https://www.suse.com/security/cve/CVE-2017-14132.html https://www.suse.com/security/cve/CVE-2017-5499.html https://www.suse.com/security/cve/CVE-2017-5503.html https://www.suse.com/security/cve/CVE-2017-5504.html https://www.suse.com/security/cve/CVE-2017-5505.html https://www.suse.com/security/cve/CVE-2017-9782.html https://www.suse.com/security/cve/CVE-2018-18873.html https://www.suse.com/security/cve/CVE-2018-19139.html https://www.suse.com/security/cve/CVE-2018-19543.html https://www.suse.com/security/cve/CVE-2018-20570.html https://www.suse.com/security/cve/CVE-2018-20622.html https://www.suse.com/security/cve/CVE-2018-9252.html https://bugzilla.suse.com/1010979 https://bugzilla.suse.com/1010980 https://bugzilla.suse.com/1020451 https://bugzilla.suse.com/1020456 https://bugzilla.suse.com/1020458 https://bugzilla.suse.com/1020460 https://bugzilla.suse.com/1045450 https://bugzilla.suse.com/1057152 https://bugzilla.suse.com/1088278 https://bugzilla.suse.com/1114498 https://bugzilla.suse.com/1115637 https://bugzilla.suse.com/1117328 https://bugzilla.suse.com/1120805 https://bugzilla.suse.com/1120807--