{
  "document": {
    "aggregate_severity": {
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2025-8836: fix manipulation in function jpc_floorlog2 to prevent\n  reachable assertion",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos7els/advisories/2025/clsa-2025_1761074965.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1761074965",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1761074965"
      }
    ],
    "tracking": {
      "current_release_date": "2025-11-03T14:19:56Z",
      "generator": {
        "date": "2025-11-03T14:19:56Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1761074965",
      "initial_release_date": "2025-10-21T19:29:27Z",
      "revision_history": [
        {
          "date": "2025-10-21T19:29:27Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-11-03T14:19:56Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "jasper: Fix of CVE-2025-8836"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 7",
                "product": {
                  "name": "Community Enterprise Operating System 7",
                  "product_id": "CentOS-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jasper-libs-0:1.900.1-33.el7.tuxcare.els4.i686",
                "product": {
                  "name": "jasper-libs-0:1.900.1-33.el7.tuxcare.els4.i686",
                  "product_id": "jasper-libs-0:1.900.1-33.el7.tuxcare.els4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/jasper-libs@1.900.1-33.el7.tuxcare.els4?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jasper-devel-0:1.900.1-33.el7.tuxcare.els4.i686",
                "product": {
                  "name": "jasper-devel-0:1.900.1-33.el7.tuxcare.els4.i686",
                  "product_id": "jasper-devel-0:1.900.1-33.el7.tuxcare.els4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/jasper-devel@1.900.1-33.el7.tuxcare.els4?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jasper-libs-0:1.900.1-33.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "jasper-libs-0:1.900.1-33.el7.tuxcare.els4.x86_64",
                  "product_id": "jasper-libs-0:1.900.1-33.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/jasper-libs@1.900.1-33.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jasper-devel-0:1.900.1-33.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "jasper-devel-0:1.900.1-33.el7.tuxcare.els4.x86_64",
                  "product_id": "jasper-devel-0:1.900.1-33.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/jasper-devel@1.900.1-33.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jasper-utils-0:1.900.1-33.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "jasper-utils-0:1.900.1-33.el7.tuxcare.els4.x86_64",
                  "product_id": "jasper-utils-0:1.900.1-33.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/jasper-utils@1.900.1-33.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jasper-0:1.900.1-33.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "jasper-0:1.900.1-33.el7.tuxcare.els4.x86_64",
                  "product_id": "jasper-0:1.900.1-33.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/jasper@1.900.1-33.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jasper-libs-0:1.900.1-33.el7.tuxcare.els4.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:jasper-libs-0:1.900.1-33.el7.tuxcare.els4.i686"
        },
        "product_reference": "jasper-libs-0:1.900.1-33.el7.tuxcare.els4.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jasper-libs-0:1.900.1-33.el7.tuxcare.els4.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:jasper-libs-0:1.900.1-33.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "jasper-libs-0:1.900.1-33.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jasper-devel-0:1.900.1-33.el7.tuxcare.els4.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:jasper-devel-0:1.900.1-33.el7.tuxcare.els4.i686"
        },
        "product_reference": "jasper-devel-0:1.900.1-33.el7.tuxcare.els4.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jasper-devel-0:1.900.1-33.el7.tuxcare.els4.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:jasper-devel-0:1.900.1-33.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "jasper-devel-0:1.900.1-33.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jasper-utils-0:1.900.1-33.el7.tuxcare.els4.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:jasper-utils-0:1.900.1-33.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "jasper-utils-0:1.900.1-33.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jasper-0:1.900.1-33.el7.tuxcare.els4.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:jasper-0:1.900.1-33.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "jasper-0:1.900.1-33.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "CentOS-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-8836",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.",
          "title": "Vulnerability description"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:jasper-0:1.900.1-33.el7.tuxcare.els4.x86_64",
          "CentOS-7:jasper-devel-0:1.900.1-33.el7.tuxcare.els4.i686",
          "CentOS-7:jasper-devel-0:1.900.1-33.el7.tuxcare.els4.x86_64",
          "CentOS-7:jasper-libs-0:1.900.1-33.el7.tuxcare.els4.i686",
          "CentOS-7:jasper-libs-0:1.900.1-33.el7.tuxcare.els4.x86_64",
          "CentOS-7:jasper-utils-0:1.900.1-33.el7.tuxcare.els4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-8836"
        },
        {
          "category": "external",
          "summary": "https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link",
          "url": "https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4",
          "url": "https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/issues/401",
          "url": "https://github.com/jasper-software/jasper/issues/401"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?ctiid.319370",
          "url": "https://vuldb.com/?ctiid.319370"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.319370",
          "url": "https://vuldb.com/?id.319370"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?submit.622409",
          "url": "https://vuldb.com/?submit.622409"
        }
      ],
      "release_date": "2025-08-11T08:15:00Z",
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-8835",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in JasPer up to 4.2.5. Affected by this vulnerability is the function jas_image_chclrspc of the file src/libjasper/base/jas_image.c of the component Image Color Space Conversion Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52. It is recommended to apply a patch to fix this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:jasper-0:1.900.1-33.el7.tuxcare.els4.x86_64",
          "CentOS-7:jasper-devel-0:1.900.1-33.el7.tuxcare.els4.i686",
          "CentOS-7:jasper-devel-0:1.900.1-33.el7.tuxcare.els4.x86_64",
          "CentOS-7:jasper-libs-0:1.900.1-33.el7.tuxcare.els4.i686",
          "CentOS-7:jasper-libs-0:1.900.1-33.el7.tuxcare.els4.x86_64",
          "CentOS-7:jasper-utils-0:1.900.1-33.el7.tuxcare.els4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-8835"
        },
        {
          "category": "external",
          "summary": "https://drive.google.com/file/d/1E754R-FsFkNJp9OYtu6Dqjv47uGSVP18/view?usp=sharing",
          "url": "https://drive.google.com/file/d/1E754R-FsFkNJp9OYtu6Dqjv47uGSVP18/view?usp=sharing"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/commit/bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52",
          "url": "https://github.com/jasper-software/jasper/commit/bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/issues/400",
          "url": "https://github.com/jasper-software/jasper/issues/400"
        },
        {
          "category": "external",
          "summary": "https://github.com/jasper-software/jasper/issues/400#issuecomment-3134702772",
          "url": "https://github.com/jasper-software/jasper/issues/400#issuecomment-3134702772"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?ctiid.319369",
          "url": "https://vuldb.com/?ctiid.319369"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.319369",
          "url": "https://vuldb.com/?id.319369"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?submit.622408",
          "url": "https://vuldb.com/?submit.622408"
        }
      ],
      "release_date": "2025-08-11T07:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:jasper-0:1.900.1-33.el7.tuxcare.els4.x86_64",
            "CentOS-7:jasper-devel-0:1.900.1-33.el7.tuxcare.els4.i686",
            "CentOS-7:jasper-devel-0:1.900.1-33.el7.tuxcare.els4.x86_64",
            "CentOS-7:jasper-libs-0:1.900.1-33.el7.tuxcare.els4.i686",
            "CentOS-7:jasper-libs-0:1.900.1-33.el7.tuxcare.els4.x86_64",
            "CentOS-7:jasper-utils-0:1.900.1-33.el7.tuxcare.els4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}