Описание
Security update for openjpeg2
This update for openjpeg2 fixes the following issues:
- CVE-2018-20846: Fixed OOB read in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c (bsc#1140205).
- CVE-2018-21010: Fixed heap buffer overflow in color_apply_icc_profile in bin/common/color.c (bsc#1149789).
- CVE-2020-27814: Fixed heap buffer overflow in lib/openjp2/mqc.c (bsc#1179594),
- CVE-2020-27824: Fixed OOB read in opj_dwt_calc_explicit_stepsizes() (bsc#1179821).
- CVE-2020-27841: Fixed buffer over-read in lib/openjp2/pi.c (bsc#1180042).
- CVE-2020-27842: Fixed null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c (bsc#1180043).
- CVE-2020-27843: Fixed OOB read in opj_t2_encode_packet function in openjp2/t2.c (bsc#1180044).
- CVE-2020-27845: Fixed heap-based buffer over-read in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (bsc#1180046).
Список пакетов
Container containers/open-webui:0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise Module for Basesystem 15 SP3
SUSE Linux Enterprise Module for Basesystem 15 SP4
SUSE Linux Enterprise Module for Package Hub 15 SP3
SUSE Linux Enterprise Server 15 SP1-BCL
SUSE Linux Enterprise Server 15 SP1-LTSS
SUSE Linux Enterprise Server 15 SP2-BCL
SUSE Linux Enterprise Server 15 SP2-LTSS
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server for SAP Applications 15
SUSE Linux Enterprise Server for SAP Applications 15 SP1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
SUSE Manager Proxy 4.1
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
openSUSE Leap 15.3
openSUSE Leap 15.4
Ссылки
- Link for SUSE-SU-2022:3802-1
- E-Mail link for SUSE-SU-2022:3802-1
- SUSE Security Ratings
- SUSE Bug 1140205
- SUSE Bug 1149789
- SUSE Bug 1179594
- SUSE Bug 1179821
- SUSE Bug 1180042
- SUSE Bug 1180043
- SUSE Bug 1180044
- SUSE Bug 1180046
- SUSE CVE CVE-2018-20846 page
- SUSE CVE CVE-2018-21010 page
- SUSE CVE CVE-2020-27814 page
- SUSE CVE CVE-2020-27824 page
- SUSE CVE CVE-2020-27841 page
- SUSE CVE CVE-2020-27842 page
- SUSE CVE CVE-2020-27843 page
- SUSE CVE CVE-2020-27845 page
Описание
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
Затронутые продукты
Ссылки
- CVE-2018-20846
- SUSE Bug 1140205
Описание
OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c.
Затронутые продукты
Ссылки
- CVE-2018-21010
- SUSE Bug 1149789
Описание
A heap-buffer overflow was found in the way openjpeg2 handled certain PNG format files. An attacker could use this flaw to cause an application crash or in some cases execute arbitrary code with the permission of the user running such an application.
Затронутые продукты
Ссылки
- CVE-2020-27814
- SUSE Bug 1179594
Описание
A flaw was found in OpenJPEG's encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability.
Затронутые продукты
Ссылки
- CVE-2020-27824
- SUSE Bug 1179821
Описание
There's a flaw in openjpeg in versions prior to 2.4.0 in src/lib/openjp2/pi.c. When an attacker is able to provide crafted input to be processed by the openjpeg encoder, this could cause an out-of-bounds read. The greatest impact from this flaw is to application availability.
Затронутые продукты
Ссылки
- CVE-2020-27841
- SUSE Bug 1180042
Описание
There's a flaw in openjpeg's t2 encoder in versions prior to 2.4.0. An attacker who is able to provide crafted input to be processed by openjpeg could cause a null pointer dereference. The highest impact of this flaw is to application availability.
Затронутые продукты
Ссылки
- CVE-2020-27842
- SUSE Bug 1180043
Описание
A flaw was found in OpenJPEG in versions prior to 2.4.0. This flaw allows an attacker to provide specially crafted input to the conversion or encoding functionality, causing an out-of-bounds read. The highest threat from this vulnerability is system availability.
Затронутые продукты
Ссылки
- CVE-2020-27843
- SUSE Bug 1180044
Описание
There's a flaw in src/lib/openjp2/pi.c of openjpeg in versions prior to 2.4.0. If an attacker is able to provide untrusted input to openjpeg's conversion/encoding functionality, they could cause an out-of-bounds read. The highest impact of this flaw is to application availability.
Затронутые продукты
Ссылки
- CVE-2020-27845
- SUSE Bug 1180046