{"affected":[{"ecosystem_specific":{"binaries":[{"libjasper1":"1.900.14-181.1","libjasper1-32bit":"1.900.14-181.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP1","name":"jasper","purl":"pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.900.14-181.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjasper1":"1.900.14-181.1","libjasper1-32bit":"1.900.14-181.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","name":"jasper","purl":"pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.900.14-181.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjasper1":"1.900.14-181.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"jasper","purl":"pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.900.14-181.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjasper-devel":"1.900.14-181.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP1","name":"jasper","purl":"pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.900.14-181.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjasper-devel":"1.900.14-181.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP2","name":"jasper","purl":"pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.900.14-181.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjasper1":"1.900.14-181.1","libjasper1-32bit":"1.900.14-181.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1","name":"jasper","purl":"pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.900.14-181.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjasper1":"1.900.14-181.1","libjasper1-32bit":"1.900.14-181.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"jasper","purl":"pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.900.14-181.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjasper1":"1.900.14-181.1","libjasper1-32bit":"1.900.14-181.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"jasper","purl":"pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.900.14-181.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjasper1":"1.900.14-181.1","libjasper1-32bit":"1.900.14-181.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"jasper","purl":"pkg:rpm/suse/jasper&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.900.14-181.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for jasper to version 1.900.14 fixes several issues.\n\nThese security issues were fixed:\n- CVE-2016-8887: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (bsc#1006836)\n- CVE-2016-8886: memory allocation failure in jas_malloc (jas_malloc.c) (bsc#1006599)\n- CVE-2016-8884,CVE-2016-8885: two null pointer dereferences in bmp_getdata (incomplete fix for CVE-2016-8690) (bsc#1007009)\n- CVE-2016-8883: assert in jpc_dec_tiledecode() (bsc#1006598)\n- CVE-2016-8882: segfault / null pointer access in jpc_pi_destroy (bsc#1006597)\n- CVE-2016-8881: Heap overflow in jpc_getuint16() (bsc#1006593)\n- CVE-2016-8880: Heap overflow in jpc_dec_cp_setfromcox() (bsc#1006591)\n- CVE-2016-8693 Double free vulnerability in mem_close (bsc#1005242)\n- CVE-2016-8691, CVE-2016-8692: Divide by zero in jpc_dec_process_siz (bsc#1005090)\n- CVE-2016-8690: Null pointer dereference in bmp_getdata triggered by crafted BMP image (bsc#1005084)\n- CVE-2016-2116: Memory leak in the jas_iccprof_createfrombuf function in JasPer allowed remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file (bsc#968373) \n- CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983)\n- CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886)\n- CVE-2015-5221: Use-after-free (and double-free) in Jasper JPEG-200 (bsc#942553).\n- CVE-2015-5203: Double free corruption in JasPer JPEG-2000 implementation (bsc#941919)\n- CVE-2008-3522: Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer might have allowed context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf (bsc#392410)\n- jasper: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c) (incomplete fix for CVE-2016-8887) (bsc#1006839)\n\nFor additional change description please have a look at the changelog.\n","id":"SUSE-SU-2016:2775-1","modified":"2016-11-10T17:06:16Z","published":"2016-11-10T17:06:16Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20162775-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1005084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1005090"},{"type":"REPORT","url":"https://bugzilla.suse.com/1005242"},{"type":"REPORT","url":"https://bugzilla.suse.com/1006591"},{"type":"REPORT","url":"https://bugzilla.suse.com/1006593"},{"type":"REPORT","url":"https://bugzilla.suse.com/1006597"},{"type":"REPORT","url":"https://bugzilla.suse.com/1006598"},{"type":"REPORT","url":"https://bugzilla.suse.com/1006599"},{"type":"REPORT","url":"https://bugzilla.suse.com/1006836"},{"type":"REPORT","url":"https://bugzilla.suse.com/1006839"},{"type":"REPORT","url":"https://bugzilla.suse.com/1007009"},{"type":"REPORT","url":"https://bugzilla.suse.com/392410"},{"type":"REPORT","url":"https://bugzilla.suse.com/941919"},{"type":"REPORT","url":"https://bugzilla.suse.com/942553"},{"type":"REPORT","url":"https://bugzilla.suse.com/961886"},{"type":"REPORT","url":"https://bugzilla.suse.com/963983"},{"type":"REPORT","url":"https://bugzilla.suse.com/968373"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2008-3522"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-8158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-5203"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-5221"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-1577"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-1867"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2116"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8690"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8691"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8692"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8693"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8885"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8887"}],"related":["CVE-2008-3522","CVE-2014-8158","CVE-2015-5203","CVE-2015-5221","CVE-2016-1577","CVE-2016-1867","CVE-2016-2089","CVE-2016-2116","CVE-2016-8690","CVE-2016-8691","CVE-2016-8692","CVE-2016-8693","CVE-2016-8880","CVE-2016-8881","CVE-2016-8882","CVE-2016-8883","CVE-2016-8884","CVE-2016-8885","CVE-2016-8886","CVE-2016-8887"],"summary":"Security update for jasper","upstream":["CVE-2008-3522","CVE-2014-8158","CVE-2015-5203","CVE-2015-5221","CVE-2016-1577","CVE-2016-1867","CVE-2016-2089","CVE-2016-2116","CVE-2016-8690","CVE-2016-8691","CVE-2016-8692","CVE-2016-8693","CVE-2016-8880","CVE-2016-8881","CVE-2016-8882","CVE-2016-8883","CVE-2016-8884","CVE-2016-8885","CVE-2016-8886","CVE-2016-8887"]}