opensuse-su-2024:10281-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
jasper-1.900.14-3.1 on GA media
Notes
Title of the patch
jasper-1.900.14-3.1 on GA media
Description of the patch
These are all security issues fixed in the jasper-1.900.14-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10281
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "jasper-1.900.14-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the jasper-1.900.14-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10281",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10281-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-3522 page",
"url": "https://www.suse.com/security/cve/CVE-2008-3522/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4516 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4517 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8137 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8137/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8138 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8157 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8158 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9029 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9029/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5203 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5221 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1577 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1867 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1867/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2089 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2116 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8654 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8654/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8690 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8690/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8691 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8691/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8692 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8692/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8693 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8880 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8881 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8882 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8883 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8883/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8884 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8885 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8886 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8887 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9395 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9398 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9398/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9560 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9560/"
}
],
"title": "jasper-1.900.14-3.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10281-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "jasper-1.900.14-3.1.aarch64",
"product": {
"name": "jasper-1.900.14-3.1.aarch64",
"product_id": "jasper-1.900.14-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjasper-devel-1.900.14-3.1.aarch64",
"product": {
"name": "libjasper-devel-1.900.14-3.1.aarch64",
"product_id": "libjasper-devel-1.900.14-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjasper1-1.900.14-3.1.aarch64",
"product": {
"name": "libjasper1-1.900.14-3.1.aarch64",
"product_id": "libjasper1-1.900.14-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjasper1-32bit-1.900.14-3.1.aarch64",
"product": {
"name": "libjasper1-32bit-1.900.14-3.1.aarch64",
"product_id": "libjasper1-32bit-1.900.14-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "jasper-1.900.14-3.1.ppc64le",
"product": {
"name": "jasper-1.900.14-3.1.ppc64le",
"product_id": "jasper-1.900.14-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjasper-devel-1.900.14-3.1.ppc64le",
"product": {
"name": "libjasper-devel-1.900.14-3.1.ppc64le",
"product_id": "libjasper-devel-1.900.14-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjasper1-1.900.14-3.1.ppc64le",
"product": {
"name": "libjasper1-1.900.14-3.1.ppc64le",
"product_id": "libjasper1-1.900.14-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjasper1-32bit-1.900.14-3.1.ppc64le",
"product": {
"name": "libjasper1-32bit-1.900.14-3.1.ppc64le",
"product_id": "libjasper1-32bit-1.900.14-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "jasper-1.900.14-3.1.s390x",
"product": {
"name": "jasper-1.900.14-3.1.s390x",
"product_id": "jasper-1.900.14-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libjasper-devel-1.900.14-3.1.s390x",
"product": {
"name": "libjasper-devel-1.900.14-3.1.s390x",
"product_id": "libjasper-devel-1.900.14-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libjasper1-1.900.14-3.1.s390x",
"product": {
"name": "libjasper1-1.900.14-3.1.s390x",
"product_id": "libjasper1-1.900.14-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libjasper1-32bit-1.900.14-3.1.s390x",
"product": {
"name": "libjasper1-32bit-1.900.14-3.1.s390x",
"product_id": "libjasper1-32bit-1.900.14-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "jasper-1.900.14-3.1.x86_64",
"product": {
"name": "jasper-1.900.14-3.1.x86_64",
"product_id": "jasper-1.900.14-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjasper-devel-1.900.14-3.1.x86_64",
"product": {
"name": "libjasper-devel-1.900.14-3.1.x86_64",
"product_id": "libjasper-devel-1.900.14-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjasper1-1.900.14-3.1.x86_64",
"product": {
"name": "libjasper1-1.900.14-3.1.x86_64",
"product_id": "libjasper1-1.900.14-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjasper1-32bit-1.900.14-3.1.x86_64",
"product": {
"name": "libjasper1-32bit-1.900.14-3.1.x86_64",
"product_id": "libjasper1-32bit-1.900.14-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jasper-1.900.14-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64"
},
"product_reference": "jasper-1.900.14-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jasper-1.900.14-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le"
},
"product_reference": "jasper-1.900.14-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jasper-1.900.14-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x"
},
"product_reference": "jasper-1.900.14-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jasper-1.900.14-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64"
},
"product_reference": "jasper-1.900.14-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper-devel-1.900.14-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64"
},
"product_reference": "libjasper-devel-1.900.14-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper-devel-1.900.14-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le"
},
"product_reference": "libjasper-devel-1.900.14-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper-devel-1.900.14-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x"
},
"product_reference": "libjasper-devel-1.900.14-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper-devel-1.900.14-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64"
},
"product_reference": "libjasper-devel-1.900.14-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper1-1.900.14-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64"
},
"product_reference": "libjasper1-1.900.14-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper1-1.900.14-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le"
},
"product_reference": "libjasper1-1.900.14-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper1-1.900.14-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x"
},
"product_reference": "libjasper1-1.900.14-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper1-1.900.14-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64"
},
"product_reference": "libjasper1-1.900.14-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper1-32bit-1.900.14-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64"
},
"product_reference": "libjasper1-32bit-1.900.14-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper1-32bit-1.900.14-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le"
},
"product_reference": "libjasper1-32bit-1.900.14-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper1-32bit-1.900.14-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x"
},
"product_reference": "libjasper1-32bit-1.900.14-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper1-32bit-1.900.14-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
},
"product_reference": "libjasper1-32bit-1.900.14-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-3522",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-3522"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-3522",
"url": "https://www.suse.com/security/cve/CVE-2008-3522"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2008-3522",
"url": "https://bugzilla.suse.com/1178702"
},
{
"category": "external",
"summary": "SUSE Bug 392410 for CVE-2008-3522",
"url": "https://bugzilla.suse.com/392410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2008-3522"
},
{
"cve": "CVE-2011-4516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4516"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a coding style default (COD) marker segment in a JPEG2000 file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4516",
"url": "https://www.suse.com/security/cve/CVE-2011-4516"
},
{
"category": "external",
"summary": "SUSE Bug 1006591 for CVE-2011-4516",
"url": "https://bugzilla.suse.com/1006591"
},
{
"category": "external",
"summary": "SUSE Bug 725758 for CVE-2011-4516",
"url": "https://bugzilla.suse.com/725758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-4516"
},
{
"cve": "CVE-2011-4517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4517"
}
],
"notes": [
{
"category": "general",
"text": "The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4517",
"url": "https://www.suse.com/security/cve/CVE-2011-4517"
},
{
"category": "external",
"summary": "SUSE Bug 1006593 for CVE-2011-4517",
"url": "https://bugzilla.suse.com/1006593"
},
{
"category": "external",
"summary": "SUSE Bug 725758 for CVE-2011-4517",
"url": "https://bugzilla.suse.com/725758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-4517"
},
{
"cve": "CVE-2014-8137",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8137"
}
],
"notes": [
{
"category": "general",
"text": "Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8137",
"url": "https://www.suse.com/security/cve/CVE-2014-8137"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2014-8137",
"url": "https://bugzilla.suse.com/1178702"
},
{
"category": "external",
"summary": "SUSE Bug 909474 for CVE-2014-8137",
"url": "https://bugzilla.suse.com/909474"
},
{
"category": "external",
"summary": "SUSE Bug 909475 for CVE-2014-8137",
"url": "https://bugzilla.suse.com/909475"
},
{
"category": "external",
"summary": "SUSE Bug 911837 for CVE-2014-8137",
"url": "https://bugzilla.suse.com/911837"
},
{
"category": "external",
"summary": "SUSE Bug 968373 for CVE-2014-8137",
"url": "https://bugzilla.suse.com/968373"
},
{
"category": "external",
"summary": "SUSE Bug 969776 for CVE-2014-8137",
"url": "https://bugzilla.suse.com/969776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-8137"
},
{
"cve": "CVE-2014-8138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8138"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the jp2_decode function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8138",
"url": "https://www.suse.com/security/cve/CVE-2014-8138"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2014-8138",
"url": "https://bugzilla.suse.com/1178702"
},
{
"category": "external",
"summary": "SUSE Bug 909474 for CVE-2014-8138",
"url": "https://bugzilla.suse.com/909474"
},
{
"category": "external",
"summary": "SUSE Bug 909475 for CVE-2014-8138",
"url": "https://bugzilla.suse.com/909475"
},
{
"category": "external",
"summary": "SUSE Bug 911837 for CVE-2014-8138",
"url": "https://bugzilla.suse.com/911837"
},
{
"category": "external",
"summary": "SUSE Bug 969776 for CVE-2014-8138",
"url": "https://bugzilla.suse.com/969776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-8138"
},
{
"cve": "CVE-2014-8157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8157"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8157",
"url": "https://www.suse.com/security/cve/CVE-2014-8157"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2014-8157",
"url": "https://bugzilla.suse.com/1178702"
},
{
"category": "external",
"summary": "SUSE Bug 911837 for CVE-2014-8157",
"url": "https://bugzilla.suse.com/911837"
},
{
"category": "external",
"summary": "SUSE Bug 969776 for CVE-2014-8157",
"url": "https://bugzilla.suse.com/969776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-8157"
},
{
"cve": "CVE-2014-8158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8158"
}
],
"notes": [
{
"category": "general",
"text": "Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8158",
"url": "https://www.suse.com/security/cve/CVE-2014-8158"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2014-8158",
"url": "https://bugzilla.suse.com/1178702"
},
{
"category": "external",
"summary": "SUSE Bug 911837 for CVE-2014-8158",
"url": "https://bugzilla.suse.com/911837"
},
{
"category": "external",
"summary": "SUSE Bug 969776 for CVE-2014-8158",
"url": "https://bugzilla.suse.com/969776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-8158"
},
{
"cve": "CVE-2014-9029",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9029"
}
],
"notes": [
{
"category": "general",
"text": "Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9029",
"url": "https://www.suse.com/security/cve/CVE-2014-9029"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2014-9029",
"url": "https://bugzilla.suse.com/1178702"
},
{
"category": "external",
"summary": "SUSE Bug 906364 for CVE-2014-9029",
"url": "https://bugzilla.suse.com/906364"
},
{
"category": "external",
"summary": "SUSE Bug 909474 for CVE-2014-9029",
"url": "https://bugzilla.suse.com/909474"
},
{
"category": "external",
"summary": "SUSE Bug 992991 for CVE-2014-9029",
"url": "https://bugzilla.suse.com/992991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-9029"
},
{
"cve": "CVE-2015-5203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5203"
}
],
"notes": [
{
"category": "general",
"text": "Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5203",
"url": "https://www.suse.com/security/cve/CVE-2015-5203"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2015-5203",
"url": "https://bugzilla.suse.com/1178702"
},
{
"category": "external",
"summary": "SUSE Bug 941919 for CVE-2015-5203",
"url": "https://bugzilla.suse.com/941919"
},
{
"category": "external",
"summary": "SUSE Bug 942553 for CVE-2015-5203",
"url": "https://bugzilla.suse.com/942553"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-5203"
},
{
"cve": "CVE-2015-5221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5221"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5221",
"url": "https://www.suse.com/security/cve/CVE-2015-5221"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2015-5221",
"url": "https://bugzilla.suse.com/1178702"
},
{
"category": "external",
"summary": "SUSE Bug 942553 for CVE-2015-5221",
"url": "https://bugzilla.suse.com/942553"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-5221"
},
{
"cve": "CVE-2016-1577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1577"
}
],
"notes": [
{
"category": "general",
"text": "Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1577",
"url": "https://www.suse.com/security/cve/CVE-2016-1577"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-1577",
"url": "https://bugzilla.suse.com/1178702"
},
{
"category": "external",
"summary": "SUSE Bug 968373 for CVE-2016-1577",
"url": "https://bugzilla.suse.com/968373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-1577"
},
{
"cve": "CVE-2016-1867",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1867"
}
],
"notes": [
{
"category": "general",
"text": "The jpc_pi_nextcprl function in JasPer 1.900.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1867",
"url": "https://www.suse.com/security/cve/CVE-2016-1867"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-1867",
"url": "https://bugzilla.suse.com/1178702"
},
{
"category": "external",
"summary": "SUSE Bug 961886 for CVE-2016-1867",
"url": "https://bugzilla.suse.com/961886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-1867"
},
{
"cve": "CVE-2016-2089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2089"
}
],
"notes": [
{
"category": "general",
"text": "The jas_matrix_clip function in jas_seq.c in JasPer 1.900.1 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted JPEG 2000 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2089",
"url": "https://www.suse.com/security/cve/CVE-2016-2089"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-2089",
"url": "https://bugzilla.suse.com/1178702"
},
{
"category": "external",
"summary": "SUSE Bug 963983 for CVE-2016-2089",
"url": "https://bugzilla.suse.com/963983"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-2089"
},
{
"cve": "CVE-2016-2116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2116"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2116",
"url": "https://www.suse.com/security/cve/CVE-2016-2116"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-2116",
"url": "https://bugzilla.suse.com/1178702"
},
{
"category": "external",
"summary": "SUSE Bug 968373 for CVE-2016-2116",
"url": "https://bugzilla.suse.com/968373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-2116"
},
{
"cve": "CVE-2016-8654",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8654"
}
],
"notes": [
{
"category": "general",
"text": "A heap-buffer overflow vulnerability was found in QMFB code in JPC codec caused by buffer being allocated with too small size. jasper versions before 2.0.0 are affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8654",
"url": "https://www.suse.com/security/cve/CVE-2016-8654"
},
{
"category": "external",
"summary": "SUSE Bug 1012530 for CVE-2016-8654",
"url": "https://bugzilla.suse.com/1012530"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8654",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-8654"
},
{
"cve": "CVE-2016-8690",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8690"
}
],
"notes": [
{
"category": "general",
"text": "The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8690",
"url": "https://www.suse.com/security/cve/CVE-2016-8690"
},
{
"category": "external",
"summary": "SUSE Bug 1005084 for CVE-2016-8690",
"url": "https://bugzilla.suse.com/1005084"
},
{
"category": "external",
"summary": "SUSE Bug 1007009 for CVE-2016-8690",
"url": "https://bugzilla.suse.com/1007009"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8690",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8690"
},
{
"cve": "CVE-2016-8691",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8691"
}
],
"notes": [
{
"category": "general",
"text": "The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted XRsiz value in a BMP image to the imginfo command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8691",
"url": "https://www.suse.com/security/cve/CVE-2016-8691"
},
{
"category": "external",
"summary": "SUSE Bug 1005090 for CVE-2016-8691",
"url": "https://bugzilla.suse.com/1005090"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8691",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8691"
},
{
"cve": "CVE-2016-8692",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8692"
}
],
"notes": [
{
"category": "general",
"text": "The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8692",
"url": "https://www.suse.com/security/cve/CVE-2016-8692"
},
{
"category": "external",
"summary": "SUSE Bug 1005090 for CVE-2016-8692",
"url": "https://bugzilla.suse.com/1005090"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8692",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8692"
},
{
"cve": "CVE-2016-8693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8693"
}
],
"notes": [
{
"category": "general",
"text": "Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8693",
"url": "https://www.suse.com/security/cve/CVE-2016-8693"
},
{
"category": "external",
"summary": "SUSE Bug 1005242 for CVE-2016-8693",
"url": "https://bugzilla.suse.com/1005242"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8693",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8693"
},
{
"cve": "CVE-2016-8880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8880"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4516. Reason: This candidate is a duplicate of CVE-2011-4516. Notes: All CVE users should reference CVE-2011-4516 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8880",
"url": "https://www.suse.com/security/cve/CVE-2016-8880"
},
{
"category": "external",
"summary": "SUSE Bug 1006591 for CVE-2016-8880",
"url": "https://bugzilla.suse.com/1006591"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8880",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8880"
},
{
"cve": "CVE-2016-8881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8881"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4517. Reason: This candidate is a duplicate of CVE-2011-4517. Notes: All CVE users should reference CVE-2011-4517 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8881",
"url": "https://www.suse.com/security/cve/CVE-2016-8881"
},
{
"category": "external",
"summary": "SUSE Bug 1006593 for CVE-2016-8881",
"url": "https://bugzilla.suse.com/1006593"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8881",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8881"
},
{
"cve": "CVE-2016-8882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8882"
}
],
"notes": [
{
"category": "general",
"text": "The jpc_dec_tilefini function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8882",
"url": "https://www.suse.com/security/cve/CVE-2016-8882"
},
{
"category": "external",
"summary": "SUSE Bug 1006597 for CVE-2016-8882",
"url": "https://bugzilla.suse.com/1006597"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8882",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8882"
},
{
"cve": "CVE-2016-8883",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8883"
}
],
"notes": [
{
"category": "general",
"text": "The jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8883",
"url": "https://www.suse.com/security/cve/CVE-2016-8883"
},
{
"category": "external",
"summary": "SUSE Bug 1006598 for CVE-2016-8883",
"url": "https://bugzilla.suse.com/1006598"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8883",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8883"
},
{
"cve": "CVE-2016-8884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8884"
}
],
"notes": [
{
"category": "general",
"text": "The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8690.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8884",
"url": "https://www.suse.com/security/cve/CVE-2016-8884"
},
{
"category": "external",
"summary": "SUSE Bug 1005084 for CVE-2016-8884",
"url": "https://bugzilla.suse.com/1005084"
},
{
"category": "external",
"summary": "SUSE Bug 1007009 for CVE-2016-8884",
"url": "https://bugzilla.suse.com/1007009"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8884",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-8884"
},
{
"cve": "CVE-2016-8885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8885"
}
],
"notes": [
{
"category": "general",
"text": "The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8885",
"url": "https://www.suse.com/security/cve/CVE-2016-8885"
},
{
"category": "external",
"summary": "SUSE Bug 1005084 for CVE-2016-8885",
"url": "https://bugzilla.suse.com/1005084"
},
{
"category": "external",
"summary": "SUSE Bug 1007009 for CVE-2016-8885",
"url": "https://bugzilla.suse.com/1007009"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8885",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-8885"
},
{
"cve": "CVE-2016-8886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8886"
}
],
"notes": [
{
"category": "general",
"text": "The jas_malloc function in libjasper/base/jas_malloc.c in JasPer before 1.900.11 allows remote attackers to have unspecified impact via a crafted file, which triggers a memory allocation failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8886",
"url": "https://www.suse.com/security/cve/CVE-2016-8886"
},
{
"category": "external",
"summary": "SUSE Bug 1006599 for CVE-2016-8886",
"url": "https://bugzilla.suse.com/1006599"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8886",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-8886"
},
{
"cve": "CVE-2016-8887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8887"
}
],
"notes": [
{
"category": "general",
"text": "The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8887",
"url": "https://www.suse.com/security/cve/CVE-2016-8887"
},
{
"category": "external",
"summary": "SUSE Bug 1006836 for CVE-2016-8887",
"url": "https://bugzilla.suse.com/1006836"
},
{
"category": "external",
"summary": "SUSE Bug 1006839 for CVE-2016-8887",
"url": "https://bugzilla.suse.com/1006839"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-8887",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-8887"
},
{
"cve": "CVE-2016-9395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9395"
}
],
"notes": [
{
"category": "general",
"text": "The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9395",
"url": "https://www.suse.com/security/cve/CVE-2016-9395"
},
{
"category": "external",
"summary": "SUSE Bug 1010977 for CVE-2016-9395",
"url": "https://bugzilla.suse.com/1010977"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-9395",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9395"
},
{
"cve": "CVE-2016-9398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9398"
}
],
"notes": [
{
"category": "general",
"text": "The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9398",
"url": "https://www.suse.com/security/cve/CVE-2016-9398"
},
{
"category": "external",
"summary": "SUSE Bug 1010979 for CVE-2016-9398",
"url": "https://bugzilla.suse.com/1010979"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-9398",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9398"
},
{
"cve": "CVE-2016-9560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9560"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9560",
"url": "https://www.suse.com/security/cve/CVE-2016-9560"
},
{
"category": "external",
"summary": "SUSE Bug 1011830 for CVE-2016-9560",
"url": "https://bugzilla.suse.com/1011830"
},
{
"category": "external",
"summary": "SUSE Bug 1178702 for CVE-2016-9560",
"url": "https://bugzilla.suse.com/1178702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:jasper-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-1.900.14-3.1.x86_64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.aarch64",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.ppc64le",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.s390x",
"openSUSE Tumbleweed:libjasper1-32bit-1.900.14-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-9560"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…