Bugzilla – Full Text Bug Listing |
Summary: | VUL-1: CVE-2019-12973: openjpeg,ghostscript,ghostscript-library,openjpeg2: In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a de | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Wolfgang Frisch <wolfgang.frisch> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Normal | ||
Priority: | P4 - Low | CC: | gabriele.sonnu, hpj, smash_bz, stefan.fent, thomas.leroy |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/235749/ | ||
Whiteboard: | CVSSv3:SUSE:CVE-2018-6616:4.3:(AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) CVSSv3:SUSE:CVE-2019-12973:3.3:(AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | ||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Description
Wolfgang Frisch
2019-07-04 09:55:12 UTC
Only ghostscript 9.xx is affected (SLES 12/15, Leap 15.X, Tumbleweed) ... and here the question rises why we do not use the openjpeg (devel) package ... maybe ghostscript uses a hacked version of openjpeg which I've to investigate. Nevertheless on SLES it seems that there are no openjpeg packages at all. Btw: openjpeg is below a 2-clauses BSD License :) Found this in spec file of current ghostscript # --enable-openjpeg because since Ghostscript 9.05 JasPer is deprecated # (--without-jasper is now an unrecognized option by configure) # and Ghostscript now ships modified OpenJPEG sources for JPEG2000 decoding # (replacing JasPer - although JasPer is still included for this release) # Performance, reliability and memory use whilst decoding JPX streams are all improved. # see also http://bugs.ghostscript.com/show_bug.cgi?id=691430 This is an autogenerated message for OBS integration: This bug (1140359) was mentioned in https://build.opensuse.org/request/show/731283 Factory / ghostscript This is an autogenerated message for OBS integration: This bug (1140359) was mentioned in https://build.opensuse.org/request/show/731293 Factory / ghostscript SUSE-SU-2019:2460-1: An update that fixes 7 vulnerabilities is now available. Category: security (important) Bug References: 1129180,1129186,1134156,1140359,1146882,1146884 CVE References: CVE-2019-12973,CVE-2019-14811,CVE-2019-14812,CVE-2019-14813,CVE-2019-14817,CVE-2019-3835,CVE-2019-3839 Sources used: SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): ghostscript-mini-9.27-3.21.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src): ghostscript-mini-9.27-3.21.1 SUSE Linux Enterprise Module for Basesystem 15-SP1 (src): ghostscript-9.27-3.21.1 SUSE Linux Enterprise Module for Basesystem 15 (src): ghostscript-9.27-3.21.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2019:2478-1: An update that fixes 7 vulnerabilities is now available. Category: security (important) Bug References: 1129180,1131863,1134156,1140359,1146882,1146884 CVE References: CVE-2019-12973,CVE-2019-14811,CVE-2019-14812,CVE-2019-14813,CVE-2019-14817,CVE-2019-3835,CVE-2019-3839 Sources used: SUSE OpenStack Cloud Crowbar 8 (src): ghostscript-9.27-23.28.1 SUSE OpenStack Cloud 8 (src): ghostscript-9.27-23.28.1 SUSE OpenStack Cloud 7 (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Server for SAP 12-SP1 (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Server 12-SP5 (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Server 12-SP4 (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Desktop 12-SP5 (src): ghostscript-9.27-23.28.1 SUSE Linux Enterprise Desktop 12-SP4 (src): ghostscript-9.27-23.28.1 SUSE Enterprise Storage 5 (src): ghostscript-9.27-23.28.1 SUSE Enterprise Storage 4 (src): ghostscript-9.27-23.28.1 HPE Helion Openstack 8 (src): ghostscript-9.27-23.28.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. openSUSE-SU-2019:2223-1: An update that fixes 7 vulnerabilities is now available. Category: security (important) Bug References: 1129180,1129186,1134156,1140359,1146882,1146884 CVE References: CVE-2019-12973,CVE-2019-14811,CVE-2019-14812,CVE-2019-14813,CVE-2019-14817,CVE-2019-3835,CVE-2019-3839 Sources used: openSUSE Leap 15.1 (src): ghostscript-9.27-lp151.3.6.1, ghostscript-mini-9.27-lp151.3.6.1 openSUSE-SU-2019:2222-1: An update that fixes 7 vulnerabilities is now available. Category: security (important) Bug References: 1129180,1129186,1134156,1140359,1146882,1146884 CVE References: CVE-2019-12973,CVE-2019-14811,CVE-2019-14812,CVE-2019-14813,CVE-2019-14817,CVE-2019-3835,CVE-2019-3839 Sources used: openSUSE Leap 15.0 (src): ghostscript-9.27-lp150.2.23.1, ghostscript-mini-9.27-lp150.2.23.1 @Hans, is SUSE:SLE-15:Update/openjpeg affected here? (In reply to Thomas Leroy from comment #13) > @Hans, is SUSE:SLE-15:Update/openjpeg affected here? Well, kind of. There is similar code in applications/codec/convert.c::bmptoimage(), but it's in the RLE8 decompression, not RLE4. There's input validation missing everywhere. I could fix it, although I don't think it qualifies as the same CVE. (Ref. release announcement in https://github.com/uclouvain/openjpeg/pull/1185 for openjpeg2) Fixed. |