File _patchinfo of Package patchinfo

<patchinfo incident="5767">
  <issue id="1005084" tracker="bnc">VUL-0: CVE-2016-8690: jasper: Null pointer dereference in bmp_getdata triggered by crafted BMP image</issue>
  <issue id="1005090" tracker="bnc">VUL-0: CVE-2016-8691, CVE-2016-8692: jasper: Divide by zero in jpc_dec_process_siz</issue>
  <issue id="1005242" tracker="bnc">VUL-0: CVE-2016-8693 jasper: Double free vulnerability in mem_close</issue>
  <issue id="1006591" tracker="bnc">VUL-0: CVE-2016-8880: jasper: Heap overflow in jpc_dec_cp_setfromcox()</issue>
  <issue id="1006593" tracker="bnc">VUL-0: CVE-2016-8881: jasper: Heap overflow in jpc_getuint16()</issue>
  <issue id="1006597" tracker="bnc">VUL-0: CVE-2016-8882: jasper: segfault / null pointer access in jpc_pi_destroy</issue>
  <issue id="1006598" tracker="bnc">VUL-1: CVE-2016-8883: jasper: assert in jpc_dec_tiledecode()</issue>
  <issue id="1006599" tracker="bnc">VUL-1: CVE-2016-8886: jasper: memory allocation failure in jas_malloc (jas_malloc.c)</issue>
  <issue id="392410" tracker="bnc">VUL-0: libjasper multiple integer overflows</issue>
  <issue id="941919" tracker="bnc">VUL-0: CVE-2015-5203: jasper: Double free corruption in JasPer JPEG-2000 implementation</issue>
  <issue id="942553" tracker="bnc">VUL-0: CVE-2015-5221: jasper: Use-after-free (and double-free) in Jasper JPEG-200 (CVE-2015-5221)</issue>
  <issue id="968373" tracker="bnc">VUL-0: CVE-2016-1577, CVE-2016-2116: jenkins: double free vulnerability in the jas_iccattrval_destroy function</issue>
  <issue id="2008-3522" tracker="cve" />
  <issue id="2015-5203" tracker="cve" />
  <issue id="2015-5221" tracker="cve" />
  <issue id="2016-1577" tracker="cve" />
  <issue id="2016-2116" tracker="cve" />
  <issue id="2016-8690" tracker="cve" />
  <issue id="2016-8691" tracker="cve" />
  <issue id="2016-8692" tracker="cve" />
  <issue id="2016-8693" tracker="cve" />
  <issue id="2016-8880" tracker="cve" />
  <issue id="2016-8881" tracker="cve" />
  <issue id="2016-8882" tracker="cve" />
  <issue id="2016-8883" tracker="cve" />
  <issue id="2016-8886" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>fstrba</packager>
  <description>
This update for jasper to version 1.900.14 fixes several issues.

These security issues were fixed:

- CVE-2008-3522: Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer might have allowed context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf (bsc#392410)
- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919).
- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553).
- CVE-2016-1577: Double free vulnerability in the jas_iccattrval_destroy function in JasPer allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137 (bsc#968373).
- CVE-2016-2116: Memory leak in the jas_iccprof_createfrombuf function in JasPer allowed remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file (bsc#968373)
- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084).
- CVE-2016-8691, CVE-2016-8692: Missing range check on XRsiz and YRsiz fields of SIZ marker segment (bsc#1005090).
- CVE-2016-8693: The memory stream interface allowed for a buffer size of zero. The case of a zero-sized buffer was not handled correctly, as it could lead to a double free (bsc#1005242).
- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591).
- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593).
- CVE-2016-8882: Null pointer access in jpc_pi_destroy (bsc#1006597).
- CVE-2016-8883: Assert triggered in jpc_dec_tiledecode() (bsc#1006598).
- CVE-2016-8886: Memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599).

For additional change description please have a look at the changelog.
</description>
  <summary>Security update for jasper</summary>
</patchinfo>
openSUSE Build Service is sponsored by