Summary: | <media-libs/jbigkit-2.1: "jbg_dec_in()" Buffer Overflow Vulnerability (CVE-2013-6369) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | graphics+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/57731 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() Please test and stabilize: =media-libs/jbigkit-2.1 Stable for HPPA. amd64 stable x86 stable ppc stable alpha stable arm stable CVE-2013-6369 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6369): Stack-based buffer overflow in the jbg_dec_in function in libjbig/jbig.c in JBIG-KIT before 2.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted image file. ppc64 stable ia64 stable sparc stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches and Maintainer(s), Thank you for your work. Added to new GLSA Request This issue was resolved and addressed in GLSA 201405-20 at http://security.gentoo.org/glsa/glsa-201405-20.xml by GLSA coordinator Mikle Kolyada (Zlogene). |