Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 17 Aug 2015 15:04:42 +0000
From: mancha <mancha1@...o.com>
To: oss-security@...ts.openwall.com
Cc: gustavo.grieco@...il.com
Subject: Re: Double free corruption in JasPer JPEG-2000
 implementation (CVE-2015-5203)

On Sun, Aug 16, 2015 at 06:48:49PM +0000, mancha wrote:
> On Sun, Aug 16, 2015 at 05:22:50PM +0200, Gustavo Grieco wrote:
> > A new double free affecting JasPer JPEG-2000 (libjasper 1.900) has
> > been found triggered by function jasper_image_stop_load.  Despite
> > this library is used by many programs (
> > http://www.ece.uvic.ca/~frodo/jasper/#overview), there is no one
> > providing support, so there is no fix so far.
> 
> If you email me your crasher I can look into a fix.
> 
> > 
> > This vulnerability was found by QuickFuzz.
> > 
> > Regards, Gustavo.
> 
> --mancha (https://twitter.com/mancha140)

By way of update, Gustavo shared his crasher with me and I've since
provided him with a patch that solves the most immediate cause of the
double free. However, in my review I've found other issues that require
some TLC.

I am waiting to hear back from Gustavo for his feedback.

--mancha

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ