Bug 870855 (CVE-2013-6369) - VUL-0: CVE-2013-6369: jbigkit: buffer overflow
Summary: VUL-0: CVE-2013-6369: jbigkit: buffer overflow
Status: RESOLVED FIXED
Alias: CVE-2013-6369
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-03-28 12:13 UTC by Marcus Meissner
Modified: 2014-09-01 10:03 UTC (History)
4 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2014-03-28 12:13:25 UTC
via distros, embargoed, crd 20140408.

From: Huzaifa Sidhpurwala <huzaifas@redhat.com>
Date: Fri, 28 Mar 2014 14:00:30 +0530
Subject: ***UNCHECKED*** [vs-plain] jbigkit security issue

All versions of JBIG-KIT released prior to version 2.1 contain a
security vulnerability (buffer overflow) in the decoder implemented in
the file jbig.c. This vulnerability might allow an attacker who can
supply a specially crafted JBIG data stream to gain control over the
receiving device or process.

This issue was discovered by Florian Weimer of Red Hat Product Security
Team.

It was assigned CVE-2013-6369. Proposed un-embargo date is 20140408.

If you need more information, mail me directly!


-- 
Huzaifa Sidhpurwala / Red Hat Security Response Team
Comment 1 Marcus Meissner 2014-03-28 12:14:43 UTC
no internal maintainer.

but is in SLE12-GA
Comment 2 Swamp Workflow Management 2014-03-28 23:00:19 UTC
bugbot adjusting priority
Comment 3 Marcus Meissner 2014-04-11 13:24:18 UTC
public now
From: Huzaifa Sidhpurwala <huzaifas@redhat.com>
Subject: [oss-security] jbigkit security flaw
Date: Tue, 08 Apr 2014 18:37:34 +0530

Hi All,

Florian Weimer of Red Hat Product Security Team found a stack-based
buffer overflow flaw in the libjbig library (part of jbigkit).  A
specially-crafted image file read by libjbig could be used to cause a
program linked to libjbig to crash or, potentially, to execute
arbitrary code.

This issue has been assigned CVE-2013-6369.

References:

https://bugzilla.redhat.com/show_bug.cgi?id=1032273
https://www.cl.cam.ac.uk/~mgk25/jbigkit/CHANGES



-- 
Huzaifa Sidhpurwala / Red Hat Security Response Team
Comment 4 white brian 2014-04-15 01:51:53 UTC
package updated
https://build.opensuse.org/request/show/230099
Comment 5 P Linnell 2014-04-15 03:11:08 UTC
I've asked for a new SR with a better description of the changes and the CVE noted.
Comment 6 white brian 2014-04-15 21:45:52 UTC
Done.
Comment 7 Marcus Meissner 2014-07-28 08:30:24 UTC
Not fixed for SLE12 yet (Petr), also no openSUSE updates yet.
Comment 8 Petr Gajdos 2014-07-29 08:49:04 UTC
openSUSE: mr#242818
Comment 10 Swamp Workflow Management 2014-08-11 08:07:01 UTC
openSUSE-SU-2014:0978-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 870855
CVE References: CVE-2013-6369
Sources used:
openSUSE 13.1 (src):    jbigkit-2.0-10.4.1
openSUSE 12.3 (src):    jbigkit-2.0-6.4.1
Comment 11 Marcus Meissner 2014-09-01 10:03:00 UTC
was released