First published: Mon Nov 21 2016(Updated: )
Improper error handling in RAS encoder/decoder with assertion test were found. Upstream patch: <a href="https://github.com/mdadams/jasper/commit/411a4068f8c464e883358bf403a3e25158863823">https://github.com/mdadams/jasper/commit/411a4068f8c464e883358bf403a3e25158863823</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q4/441">http://seclists.org/oss-sec/2016/q4/441</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jasper | ||
redhat/jasper | <1.900.14 | 1.900.14 |
Jasper Reports | =1.900.14 | |
Jasper Reports | <1.900.14 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9388 has been classified with a medium severity level due to improper error handling.
To fix CVE-2016-9388, ensure that you update the Jasper package to version 1.900.14 or later.
CVE-2016-9388 affects the Jasper package, specifically versions below 1.900.14.
CVE-2016-9388 is an improper error handling vulnerability found in the RAS encoder/decoder.
Yes, an upstream patch for CVE-2016-9388 has been released, addressing the assertion test issue.