First published: Wed Mar 15 2017(Updated: )
An integer overflow vulnerability that results into use of uninitialized value in jpc_pi_nextcprl was found. Upstream patch: <a href="https://github.com/mdadams/jasper/commit/1f0dfe5a42911b6880a1445f13f6d615ddb55387">https://github.com/mdadams/jasper/commit/1f0dfe5a42911b6880a1445f13f6d615ddb55387</a> Reference: <a href="http://seclists.org/oss-sec/2017/q1/609">http://seclists.org/oss-sec/2017/q1/609</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jasper | ||
redhat/jasper | <1.900.20 | 1.900.20 |
Jasper Reports | <=1.900.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10251 is considered a moderate severity vulnerability due to the potential consequences of integer overflow and use of uninitialized values.
To fix CVE-2016-10251, update the jasper package to version 1.900.20 or later for Red Hat systems, or to the latest available version for Debian systems.
CVE-2016-10251 affects jasper versions earlier than 1.900.20 on Red Hat and versions up to 1.900.19 on other systems.
CVE-2016-10251 impacts the jasper library used for image processing across various Linux distributions including Debian and Red Hat.
There are no confirmed reports of active exploitation for CVE-2016-10251, but it is still crucial to apply the necessary patches.