First published: Mon Nov 21 2016(Updated: )
An assertion test was used when ensuring the component domains are the same for the ICT/RCT in the JPC codec. Upstream patch: <a href="https://github.com/mdadams/jasper/commit/dee11ec440d7908d1daf69f40a3324b27cf213ba">https://github.com/mdadams/jasper/commit/dee11ec440d7908d1daf69f40a3324b27cf213ba</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q4/441">http://seclists.org/oss-sec/2016/q4/441</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jasper | ||
redhat/jasper | <1.900.14 | 1.900.14 |
Jasper Reports | <=1.900.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9389 is classified as a medium severity vulnerability.
To resolve CVE-2016-9389, update the Jasper package to version 1.900.14 or later.
CVE-2016-9389 affects the Jasper codec in versions up to 1.900.13.
CVE-2016-9389 is an assertion test vulnerability in the JPC codec related to component domain validation.
Yes, there is an upstream patch available for CVE-2016-9389 that addresses the vulnerability.