Security update for jasper
Announcement ID: | SUSE-SU-2016:2775-1 |
Rating: | moderate |
References: | #1005084 #1005090 #1005242 #1006591 #1006593 #1006597 #1006598 #1006599 #1006836 #1006839 #1007009 #392410 #941919 #942553 #961886 #963983 #968373 |
Affected Products: |
An update that fixes 20 vulnerabilities is now available.
Description:
This update for jasper to version 1.900.14 fixes several issues.
These security issues were fixed:
- CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c)
(bsc#1006836)
- CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c)
(bsc#1006599)
- CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in
bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)
- CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)
- CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy
(bsc#1006597)
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)
- CVE-2016-8693 Double free vulnerability in mem_close (bsc#1005242)
- CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz
(bsc#1005090)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by
crafted BMP image (bsc#1005084)
- CVE-2016-2116: Memory leak in the jas_iccprof_createfrombuf function in
JasPer allowed remote attackers to cause a denial of service (memory
consumption) via a crafted ICC color profile in a JPEG 2000 image file
(bsc#968373)
- CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function
(bsc#963983)
- CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl()
function (bsc#961886)
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200
(bsc#942553).
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation
(bsc#941919)
- CVE-2008-3522: Buffer overflow in the jas_stream_printf function in
libjasper/base/jas_stream.c in JasPer might have allowed
context-dependent attackers to have an unknown impact via vectors
related to the mif_hdr_put function and use of vsprintf (bsc#392410)
- jasper: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c)
(incomplete fix for CVE-2016-8887) (bsc#1006839)
For additional change description please have a look at the changelog.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1639=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1639=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1639=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1639=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1639=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1639=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1639=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
- jasper-debuginfo-1.900.14-181.1
- jasper-debugsource-1.900.14-181.1
- libjasper-devel-1.900.14-181.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
- jasper-debuginfo-1.900.14-181.1
- jasper-debugsource-1.900.14-181.1
- libjasper-devel-1.900.14-181.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
- jasper-debuginfo-1.900.14-181.1
- jasper-debugsource-1.900.14-181.1
- libjasper1-1.900.14-181.1
- libjasper1-debuginfo-1.900.14-181.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
- jasper-debuginfo-1.900.14-181.1
- jasper-debugsource-1.900.14-181.1
- libjasper1-1.900.14-181.1
- libjasper1-debuginfo-1.900.14-181.1
- SUSE Linux Enterprise Server 12-SP2 (x86_64):
- libjasper1-32bit-1.900.14-181.1
- libjasper1-debuginfo-32bit-1.900.14-181.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
- jasper-debuginfo-1.900.14-181.1
- jasper-debugsource-1.900.14-181.1
- libjasper1-1.900.14-181.1
- libjasper1-debuginfo-1.900.14-181.1
- SUSE Linux Enterprise Server 12-SP1 (s390x x86_64):
- libjasper1-32bit-1.900.14-181.1
- libjasper1-debuginfo-32bit-1.900.14-181.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
- jasper-debuginfo-1.900.14-181.1
- jasper-debugsource-1.900.14-181.1
- libjasper1-1.900.14-181.1
- libjasper1-32bit-1.900.14-181.1
- libjasper1-debuginfo-1.900.14-181.1
- libjasper1-debuginfo-32bit-1.900.14-181.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
- jasper-debuginfo-1.900.14-181.1
- jasper-debugsource-1.900.14-181.1
- libjasper1-1.900.14-181.1
- libjasper1-32bit-1.900.14-181.1
- libjasper1-debuginfo-1.900.14-181.1
- libjasper1-debuginfo-32bit-1.900.14-181.1
References:
- https://www.suse.com/security/cve/CVE-2008-3522.html
- https://www.suse.com/security/cve/CVE-2014-8158.html
- https://www.suse.com/security/cve/CVE-2015-5203.html
- https://www.suse.com/security/cve/CVE-2015-5221.html
- https://www.suse.com/security/cve/CVE-2016-1577.html
- https://www.suse.com/security/cve/CVE-2016-1867.html
- https://www.suse.com/security/cve/CVE-2016-2089.html
- https://www.suse.com/security/cve/CVE-2016-2116.html
- https://www.suse.com/security/cve/CVE-2016-8690.html
- https://www.suse.com/security/cve/CVE-2016-8691.html
- https://www.suse.com/security/cve/CVE-2016-8692.html
- https://www.suse.com/security/cve/CVE-2016-8693.html
- https://www.suse.com/security/cve/CVE-2016-8880.html
- https://www.suse.com/security/cve/CVE-2016-8881.html
- https://www.suse.com/security/cve/CVE-2016-8882.html
- https://www.suse.com/security/cve/CVE-2016-8883.html
- https://www.suse.com/security/cve/CVE-2016-8884.html
- https://www.suse.com/security/cve/CVE-2016-8885.html
- https://www.suse.com/security/cve/CVE-2016-8886.html
- https://www.suse.com/security/cve/CVE-2016-8887.html
- https://bugzilla.suse.com/1005084
- https://bugzilla.suse.com/1005090
- https://bugzilla.suse.com/1005242
- https://bugzilla.suse.com/1006591
- https://bugzilla.suse.com/1006593
- https://bugzilla.suse.com/1006597
- https://bugzilla.suse.com/1006598
- https://bugzilla.suse.com/1006599
- https://bugzilla.suse.com/1006836
- https://bugzilla.suse.com/1006839
- https://bugzilla.suse.com/1007009
- https://bugzilla.suse.com/392410
- https://bugzilla.suse.com/941919
- https://bugzilla.suse.com/942553
- https://bugzilla.suse.com/961886
- https://bugzilla.suse.com/963983
- https://bugzilla.suse.com/968373