CVE-2011-4517
Publication date 14 December 2011
Last updated 24 July 2024
Ubuntu priority
The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.
Status
Package | Ubuntu Release | Status |
---|---|---|
ghostscript | 11.10 oneiric |
Not affected
|
11.04 natty |
Not affected
|
|
10.10 maverick |
Fixed 8.71.dfsg.2-0ubuntu7.1
|
|
10.04 LTS lucid |
Fixed 8.71.dfsg.1-0ubuntu5.4
|
|
8.04 LTS hardy |
Fixed 8.61.dfsg.1-1ubuntu3.4
|
|
jasper | 11.10 oneiric |
Fixed 1.900.1-7ubuntu2.11.10.1
|
11.04 natty |
Fixed 1.900.1-7ubuntu2.11.04.1
|
|
10.10 maverick |
Fixed 1.900.1-7ubuntu0.10.10.1
|
|
10.04 LTS lucid |
Fixed 1.900.1-7ubuntu0.10.04.1
|
|
8.04 LTS hardy | Ignored end of life | |
netpbm-free | 11.10 oneiric |
Not affected
|
11.04 natty |
Not affected
|
|
10.10 maverick |
Not affected
|
|
10.04 LTS lucid |
Not affected
|
|
8.04 LTS hardy |
Not affected
|
Notes
mdeslaur
ghostscript has embedded jasper in maverick and older Debian’s netpbm-free doesn’t contain jasper
Patch details
Package | Patch details |
---|---|
jasper | |
netpbm-free |
References
Related Ubuntu Security Notices (USN)
- USN-1315-1
- JasPer vulnerabilities
- 20 December 2011
- USN-1317-1
- Ghostscript vulnerabilities
- 4 January 2012