Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
patchinfo.23514
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.23514
<patchinfo incident="23514"> <issue tracker="cve" id="2018-5727"/> <issue tracker="cve" id="2018-14423"/> <issue tracker="cve" id="2020-15389"/> <issue tracker="cve" id="2022-1122"/> <issue tracker="cve" id="2018-20845"/> <issue tracker="cve" id="2020-27823"/> <issue tracker="cve" id="2018-16376"/> <issue tracker="cve" id="2021-29338"/> <issue tracker="cve" id="2020-6851"/> <issue tracker="cve" id="2020-8112"/> <issue tracker="cve" id="2018-16375"/> <issue tracker="cve" id="2018-5785"/> <issue tracker="cve" id="2018-6616"/> <issue tracker="bnc" id="1106882">VUL-1: CVE-2018-16375: openjpeg2: Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c</issue> <issue tracker="bnc" id="1180457">VUL-0: CVE-2020-27823: openjpeg,openjpeg2: heap buffer over-write in opj_tcd_dc_level_shift_encode()</issue> <issue tracker="bnc" id="1076314">VUL-2: CVE-2018-5727: openjpeg2: In OpenJPEG 2.3.0, there is an integer overflow vulnerability in theopj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leveragethis vulnerability to cause a denial of service via a crafted</issue> <issue tracker="bnc" id="1140130">VUL-1: CVE-2018-20845: openjpeg,openjpeg2: Division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c</issue> <issue tracker="bnc" id="1162090">VUL-0: CVE-2020-8112: openjpeg2, ghostscript: opj_t1_clbl_decode_processor in openjp2/t1.c has a heap-based buffer overflow</issue> <issue tracker="bnc" id="1079845">VUL-1: CVE-2018-6616: openjpeg2: There is an excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c.</issue> <issue tracker="bnc" id="1076967">VUL-1: CVE-2018-5785: openjpeg2: In OpenJPEG 2.3.0, there is an integer overflow caused by an out-of-bounds leftshift in the opj_j2k_setup_encoder function (openjp2/j2k.c). Remote attackerscould leverage this vulnerability to cause a deni</issue> <issue tracker="bnc" id="1173578">VUL-0: CVE-2020-15389: openjpeg2: use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor</issue> <issue tracker="bnc" id="1184774">VUL-1: CVE-2021-29338: openjpeg2: Integer Overflow allows remote attackers to crash the application</issue> <issue tracker="bnc" id="1197738">VUL-0: CVE-2022-1122: openjpeg2,openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer</issue> <issue tracker="bnc" id="1102016">VUL-1: CVE-2018-14423: openjpeg,openjpeg2: Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c</issue> <issue tracker="bnc" id="1106881">VUL-1: CVE-2018-16376: openjpeg2: heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c.</issue> <issue tracker="bnc" id="1160782">VUL-0: CVE-2020-6851: openjpeg2, ghostscript: heap-based buffer overflow in opj_t1_clbl_decode_processor</issue> <packager>hpjansson</packager> <rating>important</rating> <category>security</category> <summary>Security update for openjpeg2</summary> <description>This update for openjpeg2 fixes the following issues: - CVE-2018-5727: Fixed integer overflow vulnerability in theopj_t1_encode_cblks function (bsc#1076314). - CVE-2018-5785: Fixed integer overflow caused by an out-of-bounds leftshift in the opj_j2k_setup_encoder function (bsc#1076967). - CVE-2018-6616: Fixed excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c (bsc#1079845). - CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016). - CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882). - CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881). - CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.ci (bsc#1140130). - CVE-2020-6851: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor (bsc#1160782). - CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090). - CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578). - CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457). - CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774). - CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738). </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor