364 lines
16 KiB
JSON
364 lines
16 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20181947",
|
|
"Version": "oval:org.altlinux.errata:def:20181947",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2018-1947: package `libjasper` update to version 2.0.14-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c10f1"
|
|
],
|
|
"Products": [
|
|
"ALT SP Workstation",
|
|
"ALT SP Server"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2018-1947",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1947",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-10251",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10251",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-8654",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8654",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-8690",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8690",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9262",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9262",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9389",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9389",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9390",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9390",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9391",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9391",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9392",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9392",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9394",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9394",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9395",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9395",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9397",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9397",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9398",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9398",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9557",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9557",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9560",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9560",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9583",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9583",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9591",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9591",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-9600",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9600",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-6850",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6850",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-6851",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6851",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-6852",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6852",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades libjasper to version 2.0.14-alt1. \nSecurity Fix(es):\n\n * CVE-2016-10251: Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.\n\n * CVE-2016-8654: A heap-buffer overflow vulnerability was found in QMFB code in JPC codec caused by buffer being allocated with too small size. jasper versions before 2.0.0 are affected.\n\n * CVE-2016-8690: The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.\n\n * CVE-2016-9262: Multiple integer overflows in the (1) jas_realloc function in base/jas_malloc.c and (2) mem_resize function in base/jas_stream.c in JasPer before 1.900.22 allow remote attackers to cause a denial of service via a crafted image, which triggers use after free vulnerabilities.\n\n * CVE-2016-9389: The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure).\n\n * CVE-2016-9390: The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.\n\n * CVE-2016-9391: The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer.\n\n * CVE-2016-9392: The calcstepsizes function in jpc_dec.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.\n\n * CVE-2016-9394: The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.\n\n * CVE-2016-9395: The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.\n\n * CVE-2016-9397: The jpc_dequantize function in jpc_dec.c in JasPer 1.900.13 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.\n\n * CVE-2016-9398: The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.\n\n * CVE-2016-9557: Integer overflow in jas_image.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (application crash) via a crafted file.\n\n * CVE-2016-9560: Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.\n\n * CVE-2016-9583: An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.\n\n * CVE-2016-9591: JasPer before version 2.0.12 is vulnerable to a use-after-free in the way it decodes certain JPEG 2000 image files resulting in a crash on the application using JasPer.\n\n * CVE-2016-9600: JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.\n\n * CVE-2017-6850: The jp2_cdef_destroy function in jp2_cod.c in JasPer before 2.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image.\n\n * CVE-2017-6851: The jas_matrix_bindsub function in jas_seq.c in JasPer 2.0.10 allows remote attackers to cause a denial of service (invalid read) via a crafted image.\n\n * CVE-2017-6852: Heap-based buffer overflow in the jpc_dec_decodepkt function in jpc_t2dec.c in JasPer 2.0.10 allows remote attackers to have unspecified impact via a crafted image.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2018-06-27"
|
|
},
|
|
"Updated": {
|
|
"Date": "2018-06-27"
|
|
},
|
|
"BDUs": null,
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2016-10251",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10251",
|
|
"Impact": "High",
|
|
"Public": "20170315"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-8654",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8654",
|
|
"Impact": "High",
|
|
"Public": "20180801"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-8690",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8690",
|
|
"Impact": "Low",
|
|
"Public": "20170215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9262",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9262",
|
|
"Impact": "Low",
|
|
"Public": "20170323"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9389",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9389",
|
|
"Impact": "High",
|
|
"Public": "20170323"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9390",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9390",
|
|
"Impact": "Low",
|
|
"Public": "20170323"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9391",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9391",
|
|
"Impact": "High",
|
|
"Public": "20170323"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9392",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9392",
|
|
"Impact": "Low",
|
|
"Public": "20170323"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9394",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9394",
|
|
"Impact": "Low",
|
|
"Public": "20170323"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9395",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9395",
|
|
"Impact": "Low",
|
|
"Public": "20170323"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9397",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-617",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9397",
|
|
"Impact": "High",
|
|
"Public": "20170323"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9398",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-617",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9398",
|
|
"Impact": "High",
|
|
"Public": "20170323"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9557",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9557",
|
|
"Impact": "Low",
|
|
"Public": "20170323"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9560",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9560",
|
|
"Impact": "High",
|
|
"Public": "20170215"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9583",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9583",
|
|
"Impact": "High",
|
|
"Public": "20180801"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9591",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9591",
|
|
"Impact": "Low",
|
|
"Public": "20180309"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-9600",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9600",
|
|
"Impact": "Low",
|
|
"Public": "20180312"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-6850",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6850",
|
|
"Impact": "Low",
|
|
"Public": "20170315"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-6851",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6851",
|
|
"Impact": "Low",
|
|
"Public": "20170315"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-6852",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6852",
|
|
"Impact": "High",
|
|
"Public": "20170315"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:10",
|
|
"cpe:/o:alt:spserver:10"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20181947001",
|
|
"Comment": "jasper is earlier than 0:2.0.14-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20181947002",
|
|
"Comment": "libjasper is earlier than 0:2.0.14-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20181947003",
|
|
"Comment": "libjasper-devel is earlier than 0:2.0.14-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20181947004",
|
|
"Comment": "libjasper-devel-doc is earlier than 0:2.0.14-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |