| Summary: | jbig2dec new security issues CVE-2016-9601, CVE-2017-797[56], and CVE-2017-7885 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | davidwhodgins, marja11, sysadmin-bugs, zombie_ryushu |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://www.linuxsecurity.com/content/view/171514/170/ | ||
| Whiteboard: | advisory MGA5-32-OK MGA5-64-OK | ||
| Source RPM: | jbig2dec-0.13-1.mga6.src.rpm | CVE: | CVE-2016-9601 |
| Status comment: | |||
|
Description
David Walser
2017-03-25 16:31:49 CET
David Walser
2017-03-25 16:32:34 CET
Whiteboard:
(none) =>
MGA5TOO Assigning to the registered maintainer. CC:
(none) =>
marja11
Nicolas Lécureuil
2017-04-24 15:38:01 CEST
CVE:
(none) =>
CVE-2016-9601 Fixed in cauldron Whiteboard:
MGA5TOO =>
(none) Fedora has issued an advisory on May 6: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/CMOLQQO2AYM3T3SKPNN2GAB3WAPH7PKK/ The CVE-2017-7975 issue appears to actually be in jbig2dec: https://bugzilla.redhat.com/show_bug.cgi?id=1443940 Severity:
normal =>
major Same with CVE-2017-7976: https://bugzilla.redhat.com/show_bug.cgi?id=1443897 Summary:
jbig2dec new security issues CVE-2016-9601 and CVE-2017-7975 =>
jbig2dec new security issues CVE-2016-9601 and CVE-2017-797[56] Same with CVE-2017-7885: https://bugzilla.redhat.com/show_bug.cgi?id=1444104 Summary:
jbig2dec new security issues CVE-2016-9601 and CVE-2017-797[56] =>
jbig2dec new security issues CVE-2016-9601, CVE-2017-797[56], and CVE-2017-7885 Fedora advisory for jbig2dec from May 14: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/XWQQMCDLDOZ535O3IKFQZE3VPCWC3HWH/
Zombie Ryushu
2017-05-20 13:49:03 CEST
URL:
(none) =>
http://www.linuxsecurity.com/content/view/171514/170/ Fedora patch added in Cauldron in jbig2dec-0.13-3.mga6 to fix the rest of these. Version:
Cauldron =>
5 Updated and patched package uploaded for Mageia 5. Advisory: ======================== Updated jbig2dec packages fix security vulnerabilities: Multiple security issues have been found in the JBIG2 decoder library, which may lead to lead to denial of service or the execution of arbitrary code if a malformed image file (usually embedded in a PDF document) is opened (CVE-2016-9601). Artifex jbig2dec has a heap-based buffer over-read leading to denial of service (application crash) because of an integer overflow in the jbig2_decode_symbol_dict function in jbig2_symbol_dict.c in libjbig2dec.a during operation on a crafted .jb2 file (CVE-2017-7885). Artifex jbig2dec allows out-of-bounds writes because of an integer overflow in the jbig2_build_huffman_table function in jbig2_huffman.c during operations on a crafted JBIG2 file, leading to a denial of service (application crash) or possibly execution of arbitrary code (CVE-2017-7975). Artifex jbig2dec allows out-of-bounds writes and reads because of an integer overflow in the jbig2_image_compose function in jbig2_image.c during operations on a crafted .jb2 file, leading to a denial of service (application crash) (CVE-2017-7976). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9601 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7885 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7975 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7976 https://www.debian.org/security/2017/dsa-3817 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/XWQQMCDLDOZ535O3IKFQZE3VPCWC3HWH/ ======================== Updated packages in core/updates_testing: ======================== jbig2dec-0.13-1.mga5 libjbig2dec0-0.13-1.mga5 libjbig2dec-devel-0.13-1.mga5 from jbig2dec-0.13-1.mga5.src.rpm Assignee:
mageia =>
qa-bugs I couldn't find any public examples of the poc files, or any jbig2 compressed files, so validating the update based only on the update installing cleanly over the prior version. Keywords:
(none) =>
validated_update
Dave Hodgins
2017-07-13 04:17:24 CEST
Whiteboard:
advisory MGA5-64-OK MGA6-64-OK =>
advisory MGA5-32-OK MGA6-64-OK
Dave Hodgins
2017-07-13 04:17:55 CEST
Whiteboard:
advisory MGA5-32-OK MGA6-64-OK =>
advisory MGA5-32-OK MGA5-64-OK An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2017-0206.html Status:
NEW =>
RESOLVED |