<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libopenjp2-7-2.5.0-4.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:13571</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libopenjp2-7-2.5.0-4.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libopenjp2-7-2.5.0-4.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-13571</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:13571</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16376/</URL>
      <Description>SUSE CVE CVE-2018-16376 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20845/</URL>
      <Description>SUSE CVE CVE-2018-20845 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20846/</URL>
      <Description>SUSE CVE CVE-2018-20846 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-21010/</URL>
      <Description>SUSE CVE CVE-2018-21010 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15389/</URL>
      <Description>SUSE CVE CVE-2020-15389 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27814/</URL>
      <Description>SUSE CVE CVE-2020-27814 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27823/</URL>
      <Description>SUSE CVE CVE-2020-27823 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27824/</URL>
      <Description>SUSE CVE CVE-2020-27824 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27841/</URL>
      <Description>SUSE CVE CVE-2020-27841 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27842/</URL>
      <Description>SUSE CVE CVE-2020-27842 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27843/</URL>
      <Description>SUSE CVE CVE-2020-27843 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27845/</URL>
      <Description>SUSE CVE CVE-2020-27845 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29338/</URL>
      <Description>SUSE CVE CVE-2021-29338 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1122/</URL>
      <Description>SUSE CVE CVE-2022-1122 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenjp2-7-2.5.0-4.1">
      <FullProductName ProductID="libopenjp2-7-2.5.0-4.1">libopenjp2-7-2.5.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenjp2-7-32bit-2.5.0-4.1">
      <FullProductName ProductID="libopenjp2-7-32bit-2.5.0-4.1">libopenjp2-7-32bit-2.5.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenjp2-7-x86-64-v3-2.5.0-4.1">
      <FullProductName ProductID="libopenjp2-7-x86-64-v3-2.5.0-4.1">libopenjp2-7-x86-64-v3-2.5.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openjpeg2-2.5.0-4.1">
      <FullProductName ProductID="openjpeg2-2.5.0-4.1">openjpeg2-2.5.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openjpeg2-devel-2.5.0-4.1">
      <FullProductName ProductID="openjpeg2-devel-2.5.0-4.1">openjpeg2-devel-2.5.0-4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openjpeg2-devel-doc-2.5.0-4.1">
      <FullProductName ProductID="openjpeg2-devel-doc-2.5.0-4.1">openjpeg2-devel-doc-2.5.0-4.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libopenjp2-7-2.5.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1">libopenjp2-7-2.5.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenjp2-7-32bit-2.5.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1">libopenjp2-7-32bit-2.5.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenjp2-7-x86-64-v3-2.5.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1">libopenjp2-7-x86-64-v3-2.5.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openjpeg2-2.5.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openjpeg2-2.5.0-4.1">openjpeg2-2.5.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openjpeg2-devel-2.5.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1">openjpeg2-devel-2.5.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openjpeg2-devel-doc-2.5.0-4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1">openjpeg2-devel-doc-2.5.0-4.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in OpenJPEG 2.3.0. A heap-based buffer overflow was discovered in the function t2_encode_packet in lib/openmj2/t2.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2018-16376</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16376.html</URL>
        <Description>CVE-2018-16376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106881</URL>
        <Description>SUSE Bug 1106881</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).</Note>
    </Notes>
    <CVE>CVE-2018-20845</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20845.html</URL>
        <Description>CVE-2018-20845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140130</URL>
        <Description>SUSE Bug 1140130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).</Note>
    </Notes>
    <CVE>CVE-2018-20846</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20846.html</URL>
        <Description>CVE-2018-20846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140205</URL>
        <Description>SUSE Bug 1140205</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c.</Note>
    </Notes>
    <CVE>CVE-2018-21010</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-21010.html</URL>
        <Description>CVE-2018-21010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149789</URL>
        <Description>SUSE Bug 1149789</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice.</Note>
    </Notes>
    <CVE>CVE-2020-15389</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15389.html</URL>
        <Description>CVE-2020-15389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173578</URL>
        <Description>SUSE Bug 1173578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-buffer overflow was found in the way openjpeg2 handled certain PNG format files. An attacker could use this flaw to cause an application crash or in some cases execute arbitrary code with the permission of the user running such an application.</Note>
    </Notes>
    <CVE>CVE-2020-27814</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27814.html</URL>
        <Description>CVE-2020-27814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179594</URL>
        <Description>SUSE Bug 1179594</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in OpenJPEG's encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-27823</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27823.html</URL>
        <Description>CVE-2020-27823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180457</URL>
        <Description>SUSE Bug 1180457</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in OpenJPEG's encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2020-27824</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27824.html</URL>
        <Description>CVE-2020-27824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179821</URL>
        <Description>SUSE Bug 1179821</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There's a flaw in openjpeg in versions prior to 2.4.0 in src/lib/openjp2/pi.c. When an attacker is able to provide crafted input to be processed by the openjpeg encoder, this could cause an out-of-bounds read. The greatest impact from this flaw is to application availability.</Note>
    </Notes>
    <CVE>CVE-2020-27841</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27841.html</URL>
        <Description>CVE-2020-27841</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180042</URL>
        <Description>SUSE Bug 1180042</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There's a flaw in openjpeg's t2 encoder in versions prior to 2.4.0. An attacker who is able to provide crafted input to be processed by openjpeg could cause a null pointer dereference. The highest impact of this flaw is to application availability.</Note>
    </Notes>
    <CVE>CVE-2020-27842</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27842.html</URL>
        <Description>CVE-2020-27842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180043</URL>
        <Description>SUSE Bug 1180043</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in OpenJPEG in versions prior to 2.4.0. This flaw allows an attacker to provide specially crafted input to the conversion or encoding functionality, causing an out-of-bounds read. The highest threat from this vulnerability is system availability.</Note>
    </Notes>
    <CVE>CVE-2020-27843</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27843.html</URL>
        <Description>CVE-2020-27843</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180044</URL>
        <Description>SUSE Bug 1180044</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There's a flaw in src/lib/openjp2/pi.c of openjpeg in versions prior to 2.4.0. If an attacker is able to provide untrusted input to openjpeg's conversion/encoding functionality, they could cause an out-of-bounds read. The highest impact of this flaw is to application availability.</Note>
    </Notes>
    <CVE>CVE-2020-27845</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27845.html</URL>
        <Description>CVE-2020-27845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180046</URL>
        <Description>SUSE Bug 1180046</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer Overflow in OpenJPEG v2.4.0 allows remote attackers to crash the application, causing a Denial of Service (DoS). This occurs when the attacker uses the command line option "-ImgDir" on a directory that contains 1048576 files.</Note>
    </Notes>
    <CVE>CVE-2021-29338</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29338.html</URL>
        <Description>CVE-2021-29338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184774</URL>
        <Description>SUSE Bug 1184774</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.</Note>
    </Notes>
    <CVE>CVE-2022-1122</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-32bit-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenjp2-7-x86-64-v3-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-2.5.0-4.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openjpeg2-devel-doc-2.5.0-4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1122.html</URL>
        <Description>CVE-2022-1122</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197738</URL>
        <Description>SUSE Bug 1197738</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
