Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Step:15-SP4
patchinfo.26661
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.26661
<patchinfo incident="26661"> <issue tracker="cve" id="2018-21010"/> <issue tracker="cve" id="2018-20846"/> <issue tracker="cve" id="2020-27845"/> <issue tracker="cve" id="2020-27843"/> <issue tracker="cve" id="2020-27842"/> <issue tracker="cve" id="2020-27824"/> <issue tracker="bnc" id="1149789">VUL-0: CVE-2018-21010: openjpeg2: heap buffer overflow in color_apply_icc_profile in bin/common/color.c</issue> <issue tracker="bnc" id="1180044">VUL-1: CVE-2020-27843: openjpeg,openjpeg2,ghostscript: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c</issue> <issue tracker="bnc" id="1179821">VUL-1: CVE-2020-27824: openjpeg,openjpeg2,ghostscript: OOB read in opj_dwt_calc_explicit_stepsizes()</issue> <issue tracker="bnc" id="1180046">VUL-1: CVE-2020-27845: openjpeg,ghostscript-library,ghostscript,openjpeg2: heap-based buffer over-read in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c</issue> <issue tracker="bnc" id="1180043">VUL-1: CVE-2020-27842: openjpeg,openjpeg2,ghostscript: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c</issue> <issue tracker="bnc" id="1140205">VUL-0: CVE-2018-20846: openjpeg,openjpeg2: Out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c</issue> <packager>hpjansson</packager> <rating>important</rating> <category>security</category> <summary>Security update for openjpeg</summary> <description>This update for openjpeg fixes the following issues: - CVE-2018-20846: Fixed an Out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi. (bsc#1140205) - CVE-2018-21010: Fixed a heap buffer overflow in color_apply_icc_profile in bin/common/color.c (bsc#1149789) - CVE-2020-27824: Fixed an OOB read in opj_dwt_calc_explicit_stepsizes() (bsc#1179821) - CVE-2020-27842: Fixed null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c (bsc#1180043) - CVE-2020-27843: Fixed an out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c (bsc#1180044) - CVE-2020-27845: Fixed a heap-based buffer over-read in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (bsc#1180046) </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor