CVE-2023-46361
Publication date 31 October 2023
Last updated 4 October 2024
Ubuntu priority
Cvss 3 Severity Score
Artifex Software jbig2dec v0.20 was discovered to contain a SEGV vulnerability via jbig2_error at /jbig2dec/jbig2.c.
Read the notes from the security team
Why is this CVE low priority?
Just a denial of service in a command line tool
Status
Package | Ubuntu Release | Status |
---|---|---|
jbig2dec | 24.10 oracular |
Vulnerable
|
24.04 LTS noble |
Vulnerable
|
|
22.04 LTS jammy |
Vulnerable
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
mdeslaur
null pointer dereference bug listed below contains similar issue
ccdm94
focal and earlier are not affected by this issue, as they do not include the changes from commit f9d37c7c, meaning, the uninitialized variable that causes the issue is not present in the code.
mdeslaur
This is just an out-of-bounds read in a command-line tool resulting in a denial of service.
Patch details
Package | Patch details |
---|---|
jbig2dec |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |