<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for jasper</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:1517-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-09-24T12:21:31Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-09-24T12:21:31Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-09-24T12:21:31Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for jasper</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for jasper fixes the following issues:

- CVE-2016-9398: Improved patch for already fixed issue (bsc#1010979).
- CVE-2016-9399: Fix assert in calcstepsizes (bsc#1010980).
- CVE-2017-5499: Validate component depth bit (bsc#1020451).
- CVE-2017-5503: Check bounds in jas_seq2d_bindsub() (bsc#1020456).
- CVE-2017-5504: Check bounds in jas_seq2d_bindsub() (bsc#1020458).
- CVE-2017-5505: Check bounds in jas_seq2d_bindsub() (bsc#1020460).
- CVE-2017-14132: Fix heap base overflow in by checking components (bsc#1057152).
- CVE-2018-9252: Fix reachable assertion in jpc_abstorelstepsize (bsc#1088278).
- CVE-2018-18873: Fix null pointer deref in ras_putdatastd (bsc#1114498).
- CVE-2018-19139: Fix mem leaks by registering jpc_unk_destroyparms (bsc#1115637).
- CVE-2018-19543, bsc#1045450 CVE-2017-9782: Fix numchans mixup (bsc#1117328).
- CVE-2018-20570: Fix heap based buffer over-read in jp2_encode (bsc#1120807).
- CVE-2018-20622: Fix memory leak in jas_malloc.c (bsc#1120805).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-1517</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:1517-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010979</URL>
      <Description>SUSE Bug 1010979</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010980</URL>
      <Description>SUSE Bug 1010980</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1020451</URL>
      <Description>SUSE Bug 1020451</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1020456</URL>
      <Description>SUSE Bug 1020456</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1020458</URL>
      <Description>SUSE Bug 1020458</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1020460</URL>
      <Description>SUSE Bug 1020460</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1045450</URL>
      <Description>SUSE Bug 1045450</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1057152</URL>
      <Description>SUSE Bug 1057152</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1088278</URL>
      <Description>SUSE Bug 1088278</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1114498</URL>
      <Description>SUSE Bug 1114498</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1115637</URL>
      <Description>SUSE Bug 1115637</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1117328</URL>
      <Description>SUSE Bug 1117328</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120805</URL>
      <Description>SUSE Bug 1120805</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120807</URL>
      <Description>SUSE Bug 1120807</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9398/</URL>
      <Description>SUSE CVE CVE-2016-9398 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9399/</URL>
      <Description>SUSE CVE CVE-2016-9399 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14132/</URL>
      <Description>SUSE CVE CVE-2017-14132 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5499/</URL>
      <Description>SUSE CVE CVE-2017-5499 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5503/</URL>
      <Description>SUSE CVE CVE-2017-5503 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5504/</URL>
      <Description>SUSE CVE CVE-2017-5504 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5505/</URL>
      <Description>SUSE CVE CVE-2017-5505 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9782/</URL>
      <Description>SUSE CVE CVE-2017-9782 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18873/</URL>
      <Description>SUSE CVE CVE-2018-18873 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19139/</URL>
      <Description>SUSE CVE CVE-2018-19139 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19543/</URL>
      <Description>SUSE CVE CVE-2018-19543 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20570/</URL>
      <Description>SUSE CVE CVE-2018-20570 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20622/</URL>
      <Description>SUSE CVE CVE-2018-20622 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9252/</URL>
      <Description>SUSE CVE CVE-2018-9252 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="jasper-2.0.14-lp151.4.9.1">
      <FullProductName ProductID="jasper-2.0.14-lp151.4.9.1">jasper-2.0.14-lp151.4.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjasper-devel-2.0.14-lp151.4.9.1">
      <FullProductName ProductID="libjasper-devel-2.0.14-lp151.4.9.1">libjasper-devel-2.0.14-lp151.4.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjasper4-2.0.14-lp151.4.9.1">
      <FullProductName ProductID="libjasper4-2.0.14-lp151.4.9.1">libjasper4-2.0.14-lp151.4.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjasper4-32bit-2.0.14-lp151.4.9.1">
      <FullProductName ProductID="libjasper4-32bit-2.0.14-lp151.4.9.1">libjasper4-32bit-2.0.14-lp151.4.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="jasper-2.0.14-lp151.4.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1">jasper-2.0.14-lp151.4.9.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjasper-devel-2.0.14-lp151.4.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1">libjasper-devel-2.0.14-lp151.4.9.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjasper4-2.0.14-lp151.4.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1">libjasper4-2.0.14-lp151.4.9.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjasper4-32bit-2.0.14-lp151.4.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1">libjasper4-32bit-2.0.14-lp151.4.9.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-9398</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9398.html</URL>
        <Description>CVE-2016-9398</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010979</URL>
        <Description>SUSE Bug 1010979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The calcstepsizes function in jpc_dec.c in JasPer 1.900.22 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-9399</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9399.html</URL>
        <Description>CVE-2016-9399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010980</URL>
        <Description>SUSE Bug 1010980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">JasPer 1.900.8, 1.900.9, 1.900.10, 1.900.11, 1.900.12, 1.900.13, 1.900.14, 1.900.15, 1.900.16, 1.900.17, 1.900.18, 1.900.19, 1.900.20, 1.900.21, 1.900.22, 1.900.23, 1.900.24, 1.900.25, 1.900.26, 1.900.27, 1.900.28, 1.900.29, 1.900.30, 1.900.31, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jas_image_ishomosamp function in libjasper/base/jas_image.c.</Note>
    </Notes>
    <CVE>CVE-2017-14132</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14132.html</URL>
        <Description>CVE-2017-14132</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057152</URL>
        <Description>SUSE Bug 1057152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in libjasper/jpc/jpc_dec.c in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-5499</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5499.html</URL>
        <Description>CVE-2017-5499</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020451</URL>
        <Description>SUSE Bug 1020451</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020456</URL>
        <Description>SUSE Bug 1020456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020460</URL>
        <Description>SUSE Bug 1020460</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115637</URL>
        <Description>SUSE Bug 1115637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dec_clnpass function in libjasper/jpc/jpc_t1dec.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-5503</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5503.html</URL>
        <Description>CVE-2017-5503</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020456</URL>
        <Description>SUSE Bug 1020456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020458</URL>
        <Description>SUSE Bug 1020458</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020460</URL>
        <Description>SUSE Bug 1020460</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The jpc_undo_roi function in libjasper/jpc/jpc_dec.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-5504</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5504.html</URL>
        <Description>CVE-2017-5504</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020456</URL>
        <Description>SUSE Bug 1020456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020458</URL>
        <Description>SUSE Bug 1020458</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020460</URL>
        <Description>SUSE Bug 1020460</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The jas_matrix_asl function in jas_seq.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-5505</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5505.html</URL>
        <Description>CVE-2017-5505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020456</URL>
        <Description>SUSE Bug 1020456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020458</URL>
        <Description>SUSE Bug 1020458</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020460</URL>
        <Description>SUSE Bug 1020460</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">JasPer 2.0.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jp2_decode function in libjasper/jp2/jp2_dec.c.</Note>
    </Notes>
    <CVE>CVE-2017-9782</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9782.html</URL>
        <Description>CVE-2017-9782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045450</URL>
        <Description>SUSE Bug 1045450</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117328</URL>
        <Description>SUSE Bug 1117328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in JasPer 2.0.14. There is a NULL pointer dereference in the function ras_putdatastd in ras/ras_enc.c.</Note>
    </Notes>
    <CVE>CVE-2018-18873</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18873.html</URL>
        <Description>CVE-2018-18873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1114495</URL>
        <Description>SUSE Bug 1114495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1114498</URL>
        <Description>SUSE Bug 1114498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue has been found in JasPer 2.0.14. There is a memory leak in jas_malloc.c when called from jpc_unk_getparms in jpc_cs.c.</Note>
    </Notes>
    <CVE>CVE-2018-19139</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19139.html</URL>
        <Description>CVE-2018-19139</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115637</URL>
        <Description>SUSE Bug 1115637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in JasPer 2.0.14. There is a heap-based buffer over-read of size 8 in the function jp2_decode in libjasper/jp2/jp2_dec.c.</Note>
    </Notes>
    <CVE>CVE-2018-19543</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19543.html</URL>
        <Description>CVE-2018-19543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045450</URL>
        <Description>SUSE Bug 1045450</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117328</URL>
        <Description>SUSE Bug 1117328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117507</URL>
        <Description>SUSE Bug 1117507</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">jp2_encode in jp2/jp2_enc.c in JasPer 2.0.14 has a heap-based buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2018-20570</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20570.html</URL>
        <Description>CVE-2018-20570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120807</URL>
        <Description>SUSE Bug 1120807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">JasPer 2.0.14 has a memory leak in base/jas_malloc.c in libjasper.a when "--output-format jp2" is used.</Note>
    </Notes>
    <CVE>CVE-2018-20622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20622.html</URL>
        <Description>CVE-2018-20622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115637</URL>
        <Description>SUSE Bug 1115637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120805</URL>
        <Description>SUSE Bug 1120805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">JasPer 2.0.14 allows denial of service via a reachable assertion in the function jpc_abstorelstepsize in libjasper/jpc/jpc_enc.c.</Note>
    </Notes>
    <CVE>CVE-2018-9252</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:jasper-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper-devel-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-2.0.14-lp151.4.9.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjasper4-32bit-2.0.14-lp151.4.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNYUBLSX2ZSBGFVNDEMDDHDZ2UPLCJR2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9252.html</URL>
        <Description>CVE-2018-9252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088278</URL>
        <Description>SUSE Bug 1088278</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178702</URL>
        <Description>SUSE Bug 1178702</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
