{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "Add Amazon Linux 2 ELS support (mirrors centos7els branch with .amzn2 dist\n  via .0/.1 leapfrog over stock 1.900.1-33.amzn2.0.1)\n- Import CVE-2020-27828 patch from amzn2 stock SRPM (out-of-bounds write in\n  jpc encoder; jasper-2.0.14-CVE-2020-27828.patch)\n- Import CVE-2021-3443 patch from amzn2 stock SRPM (NULL pointer dereference\n  in JP2 component reference handling)\n- Import CVE-2021-3467 patch from amzn2 stock SRPM (NULL pointer dereference\n  in CDEF box channel reference handling)",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1778219363",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1778219363"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/amazonlinux2els/advisories/2026/clsa-2026_1778219363.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-05-08T05:51:28Z",
      "generator": {
        "date": "2026-05-08T05:51:28Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1778219363",
      "initial_release_date": "2026-05-08T05:51:28Z",
      "revision_history": [
        {
          "date": "2026-05-08T05:51:28Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "jasper: Fix of 3 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Amazon Linux 2",
                "product": {
                  "name": "Amazon Linux 2",
                  "product_id": "Amazon-Linux-2",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:amazon:amazon_linux:2:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Amazon Linux"
          }
        ],
        "category": "vendor",
        "name": "Amazon Web Services, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
                "product": {
                  "name": "jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
                  "product_id": "jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/jasper-libs@1.900.1-33.amzn2.0.1.tuxcare.els6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
                "product": {
                  "name": "jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
                  "product_id": "jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/jasper-devel@1.900.1-33.amzn2.0.1.tuxcare.els6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
                "product": {
                  "name": "jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
                  "product_id": "jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/jasper@1.900.1-33.amzn2.0.1.tuxcare.els6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
                "product": {
                  "name": "jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
                  "product_id": "jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/jasper-utils@1.900.1-33.amzn2.0.1.tuxcare.els6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
                "product": {
                  "name": "jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
                  "product_id": "jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/jasper-libs@1.900.1-33.amzn2.0.1.tuxcare.els6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64 as a component of Amazon Linux 2",
          "product_id": "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
        },
        "product_reference": "jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
        "relates_to_product_reference": "Amazon-Linux-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686 as a component of Amazon Linux 2",
          "product_id": "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686"
        },
        "product_reference": "jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
        "relates_to_product_reference": "Amazon-Linux-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64 as a component of Amazon Linux 2",
          "product_id": "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
        },
        "product_reference": "jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
        "relates_to_product_reference": "Amazon-Linux-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64 as a component of Amazon Linux 2",
          "product_id": "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
        },
        "product_reference": "jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
        "relates_to_product_reference": "Amazon-Linux-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64 as a component of Amazon Linux 2",
          "product_id": "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
        },
        "product_reference": "jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
        "relates_to_product_reference": "Amazon-Linux-2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-8836",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.",
          "title": "Vulnerability description"
        }
      ],
      "product_status": {
        "fixed": [
          "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
          "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-8836"
        },
        {
          "category": "external",
          "summary": "https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link",
          "url": "https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4",
          "url": "https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/issues/401",
          "url": "https://github.com/jasper-software/jasper/issues/401"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?ctiid.319370",
          "url": "https://vuldb.com/?ctiid.319370"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.319370",
          "url": "https://vuldb.com/?id.319370"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?submit.622409",
          "url": "https://vuldb.com/?submit.622409"
        }
      ],
      "release_date": "2025-08-11T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-08T05:49:27.582413Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1778219363",
          "product_ids": [
            "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1778219363"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-26926",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in jasper before 2.0.25. An out of bounds read issue was found in jp2_decode function whic may lead to disclosure of information or program crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
          "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-26926"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b",
          "url": "https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/issues/264",
          "url": "https://github.com/jasper-software/jasper/issues/264"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSXESYUHMO522Z3RHXOQ2SJNWP3XTO67/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSXESYUHMO522Z3RHXOQ2SJNWP3XTO67/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYVCFVTVPL66OS7LCNLUSYCMYQAVWXMM/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYVCFVTVPL66OS7LCNLUSYCMYQAVWXMM/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/"
        }
      ],
      "release_date": "2021-02-23T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-08T05:49:27.582413Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1778219363",
          "product_ids": [
            "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1778219363"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-51257",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "description",
          "text": "An invalid memory write issue in Jasper-Software Jasper v.4.1.1 and before allows a local attacker to execute arbitrary code.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
          "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-51257"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/issues/367",
          "url": "https://github.com/jasper-software/jasper/issues/367"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNTGL7I5IJSQ4BZ5MGKWJPQYICUMHQ5I/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNTGL7I5IJSQ4BZ5MGKWJPQYICUMHQ5I/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MBF5KYWCZVIDMITRX7GBVWGNWKAMQORZ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MBF5KYWCZVIDMITRX7GBVWGNWKAMQORZ/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNTGL7I5IJSQ4BZ5MGKWJPQYICUMHQ5I/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNTGL7I5IJSQ4BZ5MGKWJPQYICUMHQ5I/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MBF5KYWCZVIDMITRX7GBVWGNWKAMQORZ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MBF5KYWCZVIDMITRX7GBVWGNWKAMQORZ/"
        }
      ],
      "release_date": "2024-01-16T02:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-08T05:49:27.582413Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1778219363",
          "product_ids": [
            "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1778219363"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-8837",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was identified in JasPer up to 4.2.5. This affects the function jpc_dec_dump of the file src/libjasper/jpc/jpc_dec.c of the component JPEG2000 File Handler. The manipulation leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8308060d3fbc1da10353ac8a95c8ea60eba9c25a. It is recommended to apply a patch to fix this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
          "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-8837"
        },
        {
          "category": "external",
          "summary": "https://drive.google.com/file/d/17Ic_DDOlH7mMT7IbTN2Bmo6SrujIUh24/view?usp=sharing",
          "url": "https://drive.google.com/file/d/17Ic_DDOlH7mMT7IbTN2Bmo6SrujIUh24/view?usp=sharing"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/commit/8308060d3fbc1da10353ac8a95c8ea60eba9c25a",
          "url": "https://github.com/jasper-software/jasper/commit/8308060d3fbc1da10353ac8a95c8ea60eba9c25a"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/issues/402",
          "url": "https://github.com/jasper-software/jasper/issues/402"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?ctiid.319371",
          "url": "https://vuldb.com/?ctiid.319371"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.319371",
          "url": "https://vuldb.com/?id.319371"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?submit.630487",
          "url": "https://vuldb.com/?submit.630487"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?submit.630488",
          "url": "https://vuldb.com/?submit.630488"
        }
      ],
      "release_date": "2025-08-11T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-08T05:49:27.582413Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1778219363",
          "product_ids": [
            "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1778219363"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2020-27828",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "description",
          "text": "There's a flaw in jasper's jpc encoder in versions prior to 2.0.23. Crafted input provided to jasper by an attacker could cause an arbitrary out-of-bounds write. This could potentially affect data confidentiality, integrity, or application availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
          "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
          "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2020-27828"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1905201",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905201"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/issues/252",
          "url": "https://github.com/jasper-software/jasper/issues/252"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COBEVDBUO3QTNR6YQBBTIQKNIB6W3MJ2/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/COBEVDBUO3QTNR6YQBBTIQKNIB6W3MJ2/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EBZZ2SNTQ4BSA6PNJCTOAKXIAXYNNF6V/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EBZZ2SNTQ4BSA6PNJCTOAKXIAXYNNF6V/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/"
        }
      ],
      "release_date": "2020-12-11T04:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-08T05:49:27.582413Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1778219363",
          "product_ids": [
            "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1778219363"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Amazon-Linux-2:jasper-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-devel-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.i686",
            "Amazon-Linux-2:jasper-libs-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64",
            "Amazon-Linux-2:jasper-utils-0:1.900.1-33.amzn2.0.1.tuxcare.els6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}