File _patchinfo of Package patchinfo.23510
<patchinfo incident="23510">
<issue tracker="cve" id="2020-8112"/>
<issue tracker="cve" id="2018-14423"/>
<issue tracker="cve" id="2018-20846"/>
<issue tracker="cve" id="2018-16375"/>
<issue tracker="cve" id="2018-20845"/>
<issue tracker="cve" id="2016-3183"/>
<issue tracker="cve" id="2021-29338"/>
<issue tracker="cve" id="2022-1122"/>
<issue tracker="cve" id="2020-27823"/>
<issue tracker="cve" id="2016-4797"/>
<issue tracker="cve" id="2020-15389"/>
<issue tracker="cve" id="2016-1924"/>
<issue tracker="cve" id="2018-16376"/>
<issue tracker="bnc" id="971617">VUL-0: CVE-2016-3183: openjpeg2: Out-of-bounds read in sycc422_to_rgb function</issue>
<issue tracker="bnc" id="1102016">VUL-1: CVE-2018-14423: openjpeg,openjpeg2: Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c</issue>
<issue tracker="bnc" id="1140130">VUL-1: CVE-2018-20845: openjpeg,openjpeg2: Division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c</issue>
<issue tracker="bnc" id="1106881">VUL-1: CVE-2018-16376: openjpeg2: heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c.</issue>
<issue tracker="bnc" id="980504">VUL-0: CVE-2016-4796,CVE-2016-1924,CVE-2016-4797: openjpeg2: Multiple heap buffer overflows</issue>
<issue tracker="bnc" id="1162090">VUL-0: CVE-2020-8112: openjpeg2, ghostscript: opj_t1_clbl_decode_processor in openjp2/t1.c has a heap-based buffer overflow</issue>
<issue tracker="bnc" id="1184774">VUL-1: CVE-2021-29338: openjpeg2: Integer Overflow allows remote attackers to crash the application</issue>
<issue tracker="bnc" id="1197738">VUL-0: CVE-2022-1122: openjpeg2,openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer</issue>
<issue tracker="bnc" id="1106882">VUL-1: CVE-2018-16375: openjpeg2: Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c</issue>
<issue tracker="bnc" id="1140205">VUL-0: CVE-2018-20846: openjpeg,openjpeg2: Out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c</issue>
<issue tracker="bnc" id="1180457">VUL-0: CVE-2020-27823: openjpeg,openjpeg2: heap buffer over-write in opj_tcd_dc_level_shift_encode()</issue>
<issue tracker="bnc" id="1173578">VUL-0: CVE-2020-15389: openjpeg2: use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor</issue>
<packager>hpjansson</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for openjpeg2</summary>
<description>This update for openjpeg2 fixes the following issues:
- CVE-2016-1924: Fixed heap buffer overflow (bsc#980504).
- CVE-2016-3183: Fixed out-of-bounds read in sycc422_to_rgb function (bsc#971617).
- CVE-2016-4797: Fixed heap buffer overflow (bsc#980504).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c (bsc#1140130).
- CVE-2018-20846: Fixed out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c (bsc#1140205).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
</description>
</patchinfo>