Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 7 Feb 2015 18:33:47 +0100
From: Hanno Böck <hanno@...eck.de>
To: Kurt Seifried <kseifried@...hat.com>
Cc: Assign a CVE Identifier <cve-assign@...re.org>,
  "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: Re: ghostscript double free and invalid read caused
 by embedded jbig2 data

On Sat, 07 Feb 2015 10:27:29 -0700
Kurt Seifried <kseifried@...hat.com> wrote:

> https://bugzilla.redhat.com/show_bug.cgi?id=570425
> 
> I'm pretty sure this issue is different than CVE-2009-0196

Ghostscript right now has ~180 open unfixed bugs from fuzzing:
http://bugs.ghostscript.com/buglist.cgi?component=fuzzing&query_format=advanced&resolution=---

I believe most of them are related to this fuzzing effort from 2013:
http://gynvael.coldwind.pl/?id=493
(I think Gynvael is on this list, maybe he can comment on the state)

gs already does invalid memory reads without any fuzzing at all. Just
compile it with asan and try to use the pdfwrite device.


-- 
Hanno Böck
http://hboeck.de/

mail/jabber: hanno@...eck.de
GPG: BBB51E42

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ