Security update for jasper

SUSE Security Update: Security update for jasper
Announcement ID: SUSE-SU-2015:0016-1
Rating: moderate
References: #906364 #909474 #909475
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 12
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Desktop 12

  • An update that solves two vulnerabilities and has one errata is now available.

    Description:

    This libjasper update fixes the following three security issues:

    - bnc#906364: heap overflows in libjasper (CVE-2014-9029)
    - bnc#909474: double-free in jas_iccattrval_destroy() (CVE-2014-8137)
    - bnc#909475: heap overflow in jas_decode() (CVE-2014-8138)

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 12:
      zypper in -t patch SUSE-SLE-SDK-12-2015-5
    • SUSE Linux Enterprise Server 12:
      zypper in -t patch SUSE-SLE-SERVER-12-2015-5
    • SUSE Linux Enterprise Desktop 12:
      zypper in -t patch SUSE-SLE-DESKTOP-12-2015-5

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
      • jasper-debuginfo-1.900.1-166.1
      • jasper-debugsource-1.900.1-166.1
      • libjasper-devel-1.900.1-166.1
    • SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
      • jasper-debuginfo-1.900.1-166.1
      • jasper-debugsource-1.900.1-166.1
      • libjasper1-1.900.1-166.1
      • libjasper1-debuginfo-1.900.1-166.1
    • SUSE Linux Enterprise Server 12 (s390x x86_64):
      • libjasper1-32bit-1.900.1-166.1
      • libjasper1-debuginfo-32bit-1.900.1-166.1
    • SUSE Linux Enterprise Desktop 12 (x86_64):
      • jasper-debuginfo-1.900.1-166.1
      • jasper-debugsource-1.900.1-166.1
      • libjasper1-1.900.1-166.1
      • libjasper1-32bit-1.900.1-166.1
      • libjasper1-debuginfo-1.900.1-166.1
      • libjasper1-debuginfo-32bit-1.900.1-166.1

    References:

    • http://support.novell.com/security/cve/CVE-2014-8137.html
    • http://support.novell.com/security/cve/CVE-2014-9029.html
    • https://bugzilla.suse.com/show_bug.cgi?id=906364
    • https://bugzilla.suse.com/show_bug.cgi?id=909474
    • https://bugzilla.suse.com/show_bug.cgi?id=909475