Linux Security
    Linux Security
    Linux Security

    Ubuntu 4497-1: OpenJPEG vulnerabilities

    Date
    156
    Posted By
    Several security issues were fixed in OpenJPEG.
    ==========================================================================
    Ubuntu Security Notice USN-4497-1
    September 15, 2020
    
    OpenJPEG vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 16.04 LTS
    
    Summary:
    
    Several security issues were fixed in OpenJPEG.
    
    Software Description:
    - openjpeg2: Open-source JPEG 2000 codec written in C language
    
    Details:
    
    It was discovered that OpenJPEG incorrectly handled certain image files. A
    remote attacker could possibly use this issue to cause a denial of service.
    (CVE-2016-9112)
    
    It was discovered that OpenJPEG did not properly handle certain input. If
    OpenJPEG were supplied with specially crafted input, it could be made to crash
    or potentially execute arbitrary code.
    (CVE-2018-20847, CVE-2018-21010, CVE-2020-6851, CVE-2020-8112, CVE-2020-15389)
    
    It was discovered that OpenJPEG incorrectly handled certain BMP files. A
    remote attacker could possibly use this issue to cause a denial of service.
    (CVE-2019-12973)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 16.04 LTS:
      libopenjp2-7                    2.1.2-1.1+deb9u5build0.16.04.1
      libopenjp2-tools                2.1.2-1.1+deb9u5build0.16.04.1
      libopenjp3d-tools               2.1.2-1.1+deb9u5build0.16.04.1
      libopenjp3d7                    2.1.2-1.1+deb9u5build0.16.04.1
      libopenjpip-dec-server          2.1.2-1.1+deb9u5build0.16.04.1
      libopenjpip-server              2.1.2-1.1+deb9u5build0.16.04.1
      libopenjpip-viewer              2.1.2-1.1+deb9u5build0.16.04.1
      libopenjpip7                    2.1.2-1.1+deb9u5build0.16.04.1
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      https://usn.ubuntu.com/4497-1
      https://launchpad.net/bugs/XXXXXX
    
    Package Information:
      https://launchpad.net/ubuntu/+source/openjpeg2/2.1.2-1.1+deb9u5build0.16.04.1
    
    -- 
    ubuntu-security-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
    

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.