Bug 1444104 (CVE-2017-7885) - CVE-2017-7885 jbig2dec: Integer overflow in jbig2_decode_symbol_dict
Summary: CVE-2017-7885 jbig2dec: Integer overflow in jbig2_decode_symbol_dict
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2017-7885
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1443898 1443899 1443933 1443934
Blocks: 1443943
TreeView+ depends on / blocked
 
Reported: 2017-04-20 15:05 UTC by Andrej Nemec
Modified: 2021-02-17 02:14 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-07-21 10:32:40 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2017-04-20 15:05:28 UTC
jbig2dec has a heap-based buffer over-read leading to denial of service (application crash) because of an integer overflow in the jbig2_decode_symbol_dict function in jbig2_symbol_dict.c in libjbig2dec.a during operation on a crafted .jb2 file.

Upstream bug:

https://bugs.ghostscript.com/show_bug.cgi?id=697703

Comment 1 Andrej Nemec 2017-04-20 15:09:49 UTC
Created jbig2dec tracking bugs for this issue:

Affects: epel-all [bug 1443899]

Comment 3 Cedric Buissart 2017-07-20 15:48:35 UTC
Acknowledgments:

Name: Dai Ge (Chinese Academy of Sciences)

Comment 5 Cedric Buissart 2017-07-21 09:35:32 UTC
Upstream fix :
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b184e783702246e15

Comment 6 Cedric Buissart 2017-07-21 10:31:05 UTC
Statement:

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification.


Note You need to log in before you can comment on or make changes to this bug.