CVE-2016-10251

Priority
Medium
Description
Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer
before 1.900.20 allows remote attackers to have unspecified impact via a
crafted file, which triggers use of an uninitialized value.
References
Bugs
Notes
 mdeslaur> fixed in (1.900.1-debian1-2.4+deb8u3)
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):DNE
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):released (1.900.1-14ubuntu3.4)
Ubuntu Touch 15.04:needed
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (1.900.1-debian1-2.4ubuntu1.1)
Ubuntu 16.10 (Yakkety Yak):released (1.900.1-debian1-2.4+deb8u3build0.16.10.1)
Ubuntu 17.04 (Zesty Zapus):DNE
Patches:
Upstream:https://github.com/mdadams/jasper/commit/1f0dfe5a42911b6880a1445f13f6d615ddb55387
More Information

Updated: 2017-05-18 18:14:12 UTC (commit 12584)