File _patchinfo of Package patchinfo.26563

<patchinfo incident="26563">
  <issue tracker="cve" id="2020-27843"/>
  <issue tracker="cve" id="2018-20846"/>
  <issue tracker="cve" id="2018-21010"/>
  <issue tracker="cve" id="2020-27842"/>
  <issue tracker="cve" id="2020-27824"/>
  <issue tracker="cve" id="2020-27814"/>
  <issue tracker="cve" id="2020-27845"/>
  <issue tracker="cve" id="2020-27841"/>
  <issue tracker="bnc" id="1149789">VUL-0: CVE-2018-21010: openjpeg2: heap buffer overflow in color_apply_icc_profile in bin/common/color.c</issue>
  <issue tracker="bnc" id="1140205">VUL-0: CVE-2018-20846: openjpeg,openjpeg2: Out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c</issue>
  <issue tracker="bnc" id="1180044">VUL-1: CVE-2020-27843: openjpeg,openjpeg2,ghostscript: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c</issue>
  <issue tracker="bnc" id="1179594">VUL-0: CVE-2020-27814: ghostscript,openjpeg2: Heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS</issue>
  <issue tracker="bnc" id="1179821">VUL-1: CVE-2020-27824: openjpeg,openjpeg2,ghostscript: OOB read in opj_dwt_calc_explicit_stepsizes()</issue>
  <issue tracker="bnc" id="1180043">VUL-1: CVE-2020-27842: openjpeg,openjpeg2,ghostscript: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c</issue>
  <issue tracker="bnc" id="1180046">VUL-1: CVE-2020-27845: openjpeg,ghostscript-library,ghostscript,openjpeg2: heap-based buffer over-read in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c</issue>
  <issue tracker="bnc" id="1180042">VUL-1: CVE-2020-27841: openjpeg,openjpeg2,ghostscript: buffer over-read in lib/openjp2/pi.c</issue>
  <packager>hpjansson</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for openjpeg2</summary>
  <description>This update for openjpeg2 fixes the following issues:

  - CVE-2018-20846: Fixed OOB read in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c (bsc#1140205).
  - CVE-2018-21010: Fixed heap buffer overflow in color_apply_icc_profile in bin/common/color.c (bsc#1149789).
  - CVE-2020-27814: Fixed heap buffer overflow in lib/openjp2/mqc.c (bsc#1179594),
  - CVE-2020-27824: Fixed OOB read in opj_dwt_calc_explicit_stepsizes() (bsc#1179821).
  - CVE-2020-27841: Fixed buffer over-read in lib/openjp2/pi.c (bsc#1180042).
  - CVE-2020-27842: Fixed null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c (bsc#1180043).
  - CVE-2020-27843: Fixed OOB read in opj_t2_encode_packet function in openjp2/t2.c (bsc#1180044).
  - CVE-2020-27845: Fixed heap-based buffer over-read in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (bsc#1180046).
</description>
</patchinfo>
openSUSE Build Service is sponsored by