GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sat Aug 26, 2017 4:26 pm Post subject: [ GLSA 201708-10 ] jbig2dec |
|
|
Gentoo Linux Security Advisory
Title: jbig2dec: User-assisted execution of arbitrary code (GLSA 201708-10)
Severity: normal
Exploitable: remote
Date: 2017-08-26
Bug(s): #616464
ID: 201708-10
Synopsis
Multiple integer overflow flaws have been discovered in jbig2dec,
possibly resulting in execution of arbitrary code or Denial of Service.
Background
jbig2dec is a decoder implementation of the JBIG2 image compression
format.
Affected Packages
Package: media-libs/jbig2dec
Vulnerable: < 0.13-r4
Unaffected: >= 0.13-r4
Architectures: All supported architectures
Description
Integer overflow errors have been discovered in the
jbig2_decode_symbol_dict, jbig2_build_huffman_table, and
jbig2_image_compose functions of jbig2dec.
Impact
A remote attacker, by enticing a user to open a specially crafted JBIG2
file using an application linked against jbig2dec, could possibly execute
arbitrary code with the privileges of the process or cause a Denial of
Service condition.
Workaround
There is no known workaround at this time.
Resolution
All jbig2dec users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/jbig2dec-0.13-r4"
|
References
CVE-2017-7885
CVE-2017-7975
CVE-2017-7976
Last edited by GLSA on Fri Sep 29, 2017 4:17 am; edited 1 time in total |
|