Bug 1658781 (CVE-2018-19540)
Summary: | CVE-2018-19540 jasper: heap-based buffer overflow of size 1 in jas_icctxtdesc_input in libjasper/base/jas_icc.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | abhgupta, dbaker, jokerman, jridky, rh-spice-bugs, sthangav, trankin |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A vulnerability was found in JasPer due to a heap-based buffer overflow caused by improper bounds checking in the jas_icctxtdesc_input function within libjasper/base/jas_icc.c, a attacker could exploit this flaw by persuading a victim to open a specially crafted file, potentially overflowing a buffer and either executing arbitrary code on the system or causing the application to crash.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-27 03:21:49 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1658782, 1658783, 1658784, 1660968, 1660972, 1660977 | ||
Bug Blocks: | 1658799 |
Description
Laura Pardo
2018-12-12 20:43:37 UTC
Created jasper tracking bugs for this issue: Affects: fedora-all [bug 1658782] Created mingw-jasper tracking bugs for this issue: Affects: epel-7 [bug 1658784] Affects: fedora-all [bug 1658783] https://github.com/mdadams/jasper/pull/198/files has the patch for CVE-2018-19540 |