SUSE-SU-2016:2776-1: moderate: Security update for jasper

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu Nov 10 13:10:29 MST 2016


   SUSE Security Update: Security update for jasper
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:2776-1
Rating:             moderate
References:         #1005084 #1005090 #1005242 #1006591 #1006593 
                    #1006597 #1006598 #1006599 #1006836 #1006839 
                    #1007009 #392410 #941919 #942553 #961886 
                    #963983 #968373 
Cross-References:   CVE-2008-3522 CVE-2015-5203 CVE-2015-5221
                    CVE-2016-1577 CVE-2016-1867 CVE-2016-2089
                    CVE-2016-2116 CVE-2016-8690 CVE-2016-8691
                    CVE-2016-8692 CVE-2016-8693 CVE-2016-8880
                    CVE-2016-8881 CVE-2016-8882 CVE-2016-8883
                    CVE-2016-8884 CVE-2016-8885 CVE-2016-8886
                    CVE-2016-8887
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that fixes 19 vulnerabilities is now available.

Description:


   This update for jasper fixes the following issues:

   Security fixes:
   - CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c)
     (bsc#1006836)
   - CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c)
     (bsc#1006599)
   - CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in
     bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)
   - CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)
   - CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy
     (bsc#1006597)
   - CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)
   - CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)
   - CVE-2016-8693: Double free vulnerability in mem_close (bsc#1005242)
   - CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz
     (bsc#1005090)
   - CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by
     crafted BMP image (bsc#1005084)
   - CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function
     (bsc#963983)
   - CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl()
     function (bsc#961886)
   - CVE-2016-1577, CVE-2016-2116: double free vulnerability in the
     jas_iccattrval_destroy function (bsc#968373)
   - CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200
     (bsc#942553)
   - CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation
     (bsc#941919)
   - CVE-2008-3522: multiple integer overflows (bsc#392410)
   - bsc#1006839: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c)
     (incomplete fix for CVE-2016-8887)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-jasper-12846=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-jasper-12846=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-jasper-12846=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libjasper-devel-1.900.14-134.25.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libjasper-1.900.14-134.25.1

   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

      libjasper-32bit-1.900.14-134.25.1

   - SUSE Linux Enterprise Server 11-SP4 (ia64):

      libjasper-x86-1.900.14-134.25.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      jasper-debuginfo-1.900.14-134.25.1
      jasper-debugsource-1.900.14-134.25.1


References:

   https://www.suse.com/security/cve/CVE-2008-3522.html
   https://www.suse.com/security/cve/CVE-2015-5203.html
   https://www.suse.com/security/cve/CVE-2015-5221.html
   https://www.suse.com/security/cve/CVE-2016-1577.html
   https://www.suse.com/security/cve/CVE-2016-1867.html
   https://www.suse.com/security/cve/CVE-2016-2089.html
   https://www.suse.com/security/cve/CVE-2016-2116.html
   https://www.suse.com/security/cve/CVE-2016-8690.html
   https://www.suse.com/security/cve/CVE-2016-8691.html
   https://www.suse.com/security/cve/CVE-2016-8692.html
   https://www.suse.com/security/cve/CVE-2016-8693.html
   https://www.suse.com/security/cve/CVE-2016-8880.html
   https://www.suse.com/security/cve/CVE-2016-8881.html
   https://www.suse.com/security/cve/CVE-2016-8882.html
   https://www.suse.com/security/cve/CVE-2016-8883.html
   https://www.suse.com/security/cve/CVE-2016-8884.html
   https://www.suse.com/security/cve/CVE-2016-8885.html
   https://www.suse.com/security/cve/CVE-2016-8886.html
   https://www.suse.com/security/cve/CVE-2016-8887.html
   https://bugzilla.suse.com/1005084
   https://bugzilla.suse.com/1005090
   https://bugzilla.suse.com/1005242
   https://bugzilla.suse.com/1006591
   https://bugzilla.suse.com/1006593
   https://bugzilla.suse.com/1006597
   https://bugzilla.suse.com/1006598
   https://bugzilla.suse.com/1006599
   https://bugzilla.suse.com/1006836
   https://bugzilla.suse.com/1006839
   https://bugzilla.suse.com/1007009
   https://bugzilla.suse.com/392410
   https://bugzilla.suse.com/941919
   https://bugzilla.suse.com/942553
   https://bugzilla.suse.com/961886
   https://bugzilla.suse.com/963983
   https://bugzilla.suse.com/968373



More information about the sle-updates mailing list