SUSE Security Update: Security update for openjpeg2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:1364-1
Rating:             moderate
References:         #1066713 #1072124 #1072125 
Cross-References:   CVE-2015-1239 CVE-2017-171479 CVE-2017-17479
                    CVE-2017-17480
Affected Products:
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:

   This update for openjpeg2 fixes the following security issues:

   - CVE-2015-1239: A double free vulnerability in the j2k_read_ppm_v3
     function allowed remote attackers to cause a denial of service (crash)
     (bsc#1066713)
   - CVE-2017-17479: A stack-based buffer overflow in the pgxtoimage function
     in jpwl/convert.c could crash the converter. (bsc#1072125)
   - CVE-2017-17480: A stack-based buffer overflow in the pgxtovolume
     function in jp3d/convert.c could crash the converter. (bsc#1072124)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-947=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-947=1



Package List:

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      libopenjp2-7-2.1.0-4.9.1
      libopenjp2-7-debuginfo-2.1.0-4.9.1
      openjpeg2-debuginfo-2.1.0-4.9.1
      openjpeg2-debugsource-2.1.0-4.9.1

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      libopenjp2-7-2.1.0-4.9.1
      libopenjp2-7-debuginfo-2.1.0-4.9.1
      openjpeg2-debuginfo-2.1.0-4.9.1
      openjpeg2-debugsource-2.1.0-4.9.1


References:

   https://www.suse.com/security/cve/CVE-2015-1239.html
   https://www.suse.com/security/cve/CVE-2017-171479.html
   https://www.suse.com/security/cve/CVE-2017-17479.html
   https://www.suse.com/security/cve/CVE-2017-17480.html
   https://bugzilla.suse.com/1066713
   https://bugzilla.suse.com/1072124
   https://bugzilla.suse.com/1072125

SUSE: 2018:1364-1 moderate: openjpeg2

May 22, 2018
An update that fixes four vulnerabilities is now available

Summary

This update for openjpeg2 fixes the following security issues: - CVE-2015-1239: A double free vulnerability in the j2k_read_ppm_v3 function allowed remote attackers to cause a denial of service (crash) (bsc#1066713) - CVE-2017-17479: A stack-based buffer overflow in the pgxtoimage function in jpwl/convert.c could crash the converter. (bsc#1072125) - CVE-2017-17480: A stack-based buffer overflow in the pgxtovolume function in jp3d/convert.c could crash the converter. (bsc#1072124) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP3: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-947=1 - SUSE Linux Enterprise Desktop 12-SP3: zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-947=1 Package List: - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64): libopenjp2-7-2.1.0-4.9.1 libopenjp2-7-debuginfo-2.1.0-4.9.1 openjpeg2-debuginfo-2.1.0-4.9.1 openjpeg2-debugsource-2.1.0-4.9.1 - SUSE Linux Enterprise Desktop 12-SP3 (x86_64): libopenjp2-7-2.1.0-4.9.1 libopenjp2-7-debuginfo-2.1.0-4.9.1 openjpeg2-debuginfo-2.1.0-4.9.1 openjpeg2-debugsource-2.1.0-4.9.1

References

#1066713 #1072124 #1072125

Cross- CVE-2015-1239 CVE-2017-171479 CVE-2017-17479

CVE-2017-17480

Affected Products:

SUSE Linux Enterprise Server 12-SP3

SUSE Linux Enterprise Desktop 12-SP3

https://www.suse.com/security/cve/CVE-2015-1239.html

https://www.suse.com/security/cve/CVE-2017-171479.html

https://www.suse.com/security/cve/CVE-2017-17479.html

https://www.suse.com/security/cve/CVE-2017-17480.html

https://bugzilla.suse.com/1066713

https://bugzilla.suse.com/1072124

https://bugzilla.suse.com/1072125

Severity
Announcement ID: SUSE-SU-2018:1364-1
Rating: moderate