Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2017-7885

Published: 16 April 2017

Artifex jbig2dec 0.13 has a heap-based buffer over-read leading to denial of service (application crash) or disclosure of sensitive information from process memory, because of an integer overflow in the jbig2_decode_symbol_dict function in jbig2_symbol_dict.c in libjbig2dec.a during operation on a crafted .jb2 file.

Priority

Low

CVSS 3 base score: 7.1

Status

Package Release Status
jbig2dec
Launchpad, Ubuntu, Debian
artful Not vulnerable
(0.13-4.1)
bionic Not vulnerable
(0.13-4.1)
cosmic Not vulnerable
(0.13-4.1)
disco Not vulnerable
(0.13-4.1)
eoan Not vulnerable
(0.13-4.1)
focal Not vulnerable
(0.13-4.1)
groovy Not vulnerable
(0.13-4.1)
hirsute Not vulnerable
(0.13-4.1)
precise Ignored
(end of ESM support, was needed)
trusty
Released (0.11+20120125-1ubuntu1.1)
upstream
Released (0.13-4.1)
xenial
Released (0.12+20150918-1ubuntu0.1)
yakkety
Released (0.13-2ubuntu0.1)
zesty
Released (0.13-4ubuntu0.1)
Patches:
upstream: http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b184e783702246e154294326d03d9abda669fcfa