openSUSE Security Update : jasper (openSUSE-2020-1523)

high Nessus Plugin ID 141070

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for jasper fixes the following issues :

- CVE-2016-9398: Improved patch for already fixed issue (bsc#1010979).

- CVE-2016-9399: Fix assert in calcstepsizes (bsc#1010980).

- CVE-2017-5499: Validate component depth bit (bsc#1020451).

- CVE-2017-5503: Check bounds in jas_seq2d_bindsub() (bsc#1020456).

- CVE-2017-5504: Check bounds in jas_seq2d_bindsub() (bsc#1020458).

- CVE-2017-5505: Check bounds in jas_seq2d_bindsub() (bsc#1020460).

- CVE-2017-14132: Fix heap base overflow in by checking components (bsc#1057152).

- CVE-2018-9252: Fix reachable assertion in jpc_abstorelstepsize (bsc#1088278).

- CVE-2018-18873: Fix NULL pointer deref in ras_putdatastd (bsc#1114498).

- CVE-2018-19139: Fix mem leaks by registering jpc_unk_destroyparms (bsc#1115637).

- CVE-2018-19543, bsc#1045450 CVE-2017-9782: Fix numchans mixup (bsc#1117328).

- CVE-2018-20570: Fix heap based buffer over-read in jp2_encode (bsc#1120807).

- CVE-2018-20622: Fix memory leak in jas_malloc.c (bsc#1120805).

This update was imported from the SUSE:SLE-15:Update update project.

Solution

Update the affected jasper packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1010979

https://bugzilla.opensuse.org/show_bug.cgi?id=1010980

https://bugzilla.opensuse.org/show_bug.cgi?id=1020451

https://bugzilla.opensuse.org/show_bug.cgi?id=1020456

https://bugzilla.opensuse.org/show_bug.cgi?id=1020458

https://bugzilla.opensuse.org/show_bug.cgi?id=1020460

https://bugzilla.opensuse.org/show_bug.cgi?id=1045450

https://bugzilla.opensuse.org/show_bug.cgi?id=1057152

https://bugzilla.opensuse.org/show_bug.cgi?id=1088278

https://bugzilla.opensuse.org/show_bug.cgi?id=1114498

https://bugzilla.opensuse.org/show_bug.cgi?id=1115637

https://bugzilla.opensuse.org/show_bug.cgi?id=1117328

https://bugzilla.opensuse.org/show_bug.cgi?id=1120805

https://bugzilla.opensuse.org/show_bug.cgi?id=1120807

Plugin Details

Severity: High

ID: 141070

File Name: openSUSE-2020-1523.nasl

Version: 1.3

Type: local

Agent: unix

Published: 9/30/2020

Updated: 2/16/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-19543

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:jasper, p-cpe:/a:novell:opensuse:jasper-debuginfo, p-cpe:/a:novell:opensuse:jasper-debugsource, p-cpe:/a:novell:opensuse:libjasper-devel, p-cpe:/a:novell:opensuse:libjasper4, p-cpe:/a:novell:opensuse:libjasper4-32bit, p-cpe:/a:novell:opensuse:libjasper4-32bit-debuginfo, p-cpe:/a:novell:opensuse:libjasper4-debuginfo, cpe:/o:novell:opensuse:15.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/25/2020

Vulnerability Publication Date: 3/1/2017

Reference Information

CVE: CVE-2016-9398, CVE-2016-9399, CVE-2017-14132, CVE-2017-5499, CVE-2017-5503, CVE-2017-5504, CVE-2017-5505, CVE-2017-9782, CVE-2018-18873, CVE-2018-19139, CVE-2018-19543, CVE-2018-20570, CVE-2018-20622, CVE-2018-9252