Joined: 12 May 2004
|Posted: Sat Aug 26, 2017 4:26 pm Post subject: [ GLSA 201708-10 ] jbig2dec
|Gentoo Linux Security Advisory
Title: jbig2dec: User-assisted execution of arbitrary code (GLSA 201708-10)
Multiple integer overflow flaws have been discovered in jbig2dec,
possibly resulting in execution of arbitrary code or Denial of Service.
jbig2dec is a decoder implementation of the JBIG2 image compression
Vulnerable: < 0.13-r4
Unaffected: >= 0.13-r4
Architectures: All supported architectures
Integer overflow errors have been discovered in the
jbig2_decode_symbol_dict, jbig2_build_huffman_table, and
jbig2_image_compose functions of jbig2dec.
A remote attacker, by enticing a user to open a specially crafted JBIG2
file using an application linked against jbig2dec, could possibly execute
arbitrary code with the privileges of the process or cause a Denial of
There is no known workaround at this time.
All jbig2dec users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/jbig2dec-0.13-r4"
Last edited by GLSA on Fri Sep 29, 2017 4:17 am; edited 1 time in total