SUSE-SU-2020:2690-1: Security update for jasper

sle-updates at lists.suse.com sle-updates at lists.suse.com
Mon Sep 21 07:14:52 MDT 2020


   SUSE Security Update: Security update for jasper
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:2690-1
Rating:             low
References:         #1010786 #1010979 #1010980 #1011829 #1020451 
                    #1020456 #1020458 #1020460 #1045450 #1057152 
                    #1088278 #1092115 #1114498 #1115637 #1117328 
                    #1120805 #1120807 
Cross-References:   CVE-2016-9397 CVE-2016-9398 CVE-2016-9399
                    CVE-2016-9557 CVE-2017-14132 CVE-2017-5499
                    CVE-2017-5503 CVE-2017-5504 CVE-2017-5505
                    CVE-2017-9782 CVE-2018-18873 CVE-2018-19139
                    CVE-2018-19543 CVE-2018-20570 CVE-2018-20622
                    CVE-2018-9154 CVE-2018-9252
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP5
                    SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________

   An update that fixes 17 vulnerabilities is now available.

Description:

   This update for jasper fixes the following issues:

   - CVE-2016-9398: Improved patch for already fixed issue (bsc#1010979).
   - CVE-2016-9399: Fix assert in calcstepsizes (bsc#1010980).
   - CVE-2016-9397: Fix assert in jpc_dequantize (bsc#1010786).
   - CVE-2016-9557: Fix signed integer overflow (bsc#1011829).
   - CVE-2017-5499: Validate component depth bit (bsc#1020451).
   - CVE-2017-5503: Check bounds in jas_seq2d_bindsub() (bsc#1020456).
   - CVE-2017-5504: Check bounds in jas_seq2d_bindsub() (bsc#1020458).
   - CVE-2017-5505: Check bounds in jas_seq2d_bindsub() (bsc#1020460).
   - CVE-2017-14132: Fix heap base overflow in by checking components
     (bsc#1057152).
   - CVE-2018-9154: Fixed a potential denial of service in
     jpc_dec_process_sot() (bsc#1092115).
   - CVE-2018-9252: Fix reachable assertion in jpc_abstorelstepsize
     (bsc#1088278).
   - CVE-2018-18873: Fix null pointer deref in ras_putdatastd (bsc#1114498).
   - CVE-2018-19139: Fix mem leaks by registering jpc_unk_destroyparms
     (bsc#1115637).
   - CVE-2018-19543, bsc#1045450 CVE-2017-9782: Fix numchans mixup
     (bsc#1117328).
   - CVE-2018-20570: Fix heap based buffer over-read in jp2_encode
     (bsc#1120807).
   - CVE-2018-20622: Fix memory leak in jas_malloc.c (bsc#1120805).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP5:

      zypper in -t patch SUSE-SLE-SDK-12-SP5-2020-2690=1

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-2690=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):

      jasper-debuginfo-1.900.14-195.22.1
      jasper-debugsource-1.900.14-195.22.1
      libjasper-devel-1.900.14-195.22.1

   - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

      jasper-debuginfo-1.900.14-195.22.1
      jasper-debugsource-1.900.14-195.22.1
      libjasper1-1.900.14-195.22.1
      libjasper1-debuginfo-1.900.14-195.22.1

   - SUSE Linux Enterprise Server 12-SP5 (s390x x86_64):

      libjasper1-32bit-1.900.14-195.22.1
      libjasper1-debuginfo-32bit-1.900.14-195.22.1


References:

   https://www.suse.com/security/cve/CVE-2016-9397.html
   https://www.suse.com/security/cve/CVE-2016-9398.html
   https://www.suse.com/security/cve/CVE-2016-9399.html
   https://www.suse.com/security/cve/CVE-2016-9557.html
   https://www.suse.com/security/cve/CVE-2017-14132.html
   https://www.suse.com/security/cve/CVE-2017-5499.html
   https://www.suse.com/security/cve/CVE-2017-5503.html
   https://www.suse.com/security/cve/CVE-2017-5504.html
   https://www.suse.com/security/cve/CVE-2017-5505.html
   https://www.suse.com/security/cve/CVE-2017-9782.html
   https://www.suse.com/security/cve/CVE-2018-18873.html
   https://www.suse.com/security/cve/CVE-2018-19139.html
   https://www.suse.com/security/cve/CVE-2018-19543.html
   https://www.suse.com/security/cve/CVE-2018-20570.html
   https://www.suse.com/security/cve/CVE-2018-20622.html
   https://www.suse.com/security/cve/CVE-2018-9154.html
   https://www.suse.com/security/cve/CVE-2018-9252.html
   https://bugzilla.suse.com/1010786
   https://bugzilla.suse.com/1010979
   https://bugzilla.suse.com/1010980
   https://bugzilla.suse.com/1011829
   https://bugzilla.suse.com/1020451
   https://bugzilla.suse.com/1020456
   https://bugzilla.suse.com/1020458
   https://bugzilla.suse.com/1020460
   https://bugzilla.suse.com/1045450
   https://bugzilla.suse.com/1057152
   https://bugzilla.suse.com/1088278
   https://bugzilla.suse.com/1092115
   https://bugzilla.suse.com/1114498
   https://bugzilla.suse.com/1115637
   https://bugzilla.suse.com/1117328
   https://bugzilla.suse.com/1120805
   https://bugzilla.suse.com/1120807



More information about the sle-updates mailing list