Lucene search

K
suseSuseOPENSUSE-SU-2017:2567-1
HistorySep 26, 2017 - 3:07 a.m.

Security update for openjpeg2 (important)

2017-09-2603:07:23
lists.opensuse.org
344

0.028 Low

EPSS

Percentile

89.5%

This update for openjpeg2 fixes the following issues:

  • CVE-2016-9114: NULL Pointer Access in function imagetopnm of
    convert.c:1943(jp2) could lead to crash [bsc#1007740]
  • CVE-2016-9115: Heap Buffer Overflow in function imagetotga of
    convert.c(jp2) [bsc#1007741]
  • CVE-2016-9580, CVE-2016-9581: Possible Heap buffer overflow via integer
    overflow and infite loop [bsc#1014975]
  • CVE-2016-9117: NULL Pointer Access in function imagetopnm of
    convert.c(jp2):1289 [bsc#1007743]
  • CVE-2016-9118: Heap Buffer Overflow in function pnmtoimage of convert.c
    [bsc#1007744]
  • CVE-2016-9112: FPE(Floating Point Exception) in lib/openjp2/pi.c:523
    [bsc#1007747]
  • CVE-2016-9116: NULL Pointer Access in function imagetopnm of
    convert.c:2226(jp2) [bsc#1007742]
  • CVE-2016-9113: NULL point dereference in function imagetobmp of
    convertbmp.c could lead to crash [bsc#1007739]
  • CVE-2016-9572 CVE-2016-9573: Insuficient check in imagetopnm() could
    lead to heap buffer overflow [bsc#1014543]
  • CVE-2016-8332: Malicious file in OpenJPEG JPEG2000 format could lead to
    code execution [bsc#1002414]
  • CVE-2016-7445: Null pointer dereference in convert.c could lead to crash
    [bsc#999817]
  • CVE 2016-7163: Integer Overflow could lead to remote code execution
    [bsc#997857]
  • CVE 2015-8871: Use-after-free in opj_j2k_write_mco function could lead
    to denial of service [bsc#979907]

This update was imported from the SUSE:SLE-12-SP2:Update update project.