Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 28 Aug 2015 04:34:56 +0000
From: mancha <mancha1@...o.com>
To: oss-security@...ts.openwall.com
Cc: feld@...d.me
Subject: Re: Double free corruption in JasPer JPEG-2000
 implementation (CVE-2015-5203)

On Mon, Aug 24, 2015 at 10:53:17AM -0500, Mark Felder wrote:
> 
> On Fri, Aug 21, 2015, at 09:58, mancha wrote:
> > On Sun, Aug 16, 2015 at 05:22:50PM +0200, Gustavo Grieco wrote:
> > > A new double free affecting JasPer JPEG-2000 (libjasper 1.900) has
> > > been found triggered by function jasper_image_stop_load.  Despite
> > > this library is used by many programs (
> > > http://www.ece.uvic.ca/~frodo/jasper/#overview), there is no one
> > > providing support, so there is no fix so far.
> > > 
> > > This vulnerability was found by QuickFuzz.
> > > 
> > > Regards, Gustavo.
> > 
> > Hi all.
> > 
> > This is the CVE-2015-5203 fix I shared with Gustavo:
> > 
> > http://sf.net/projects/mancha/files/sec/jasper-1.900.1_CVE-2015-5203.diff
> > 
> 
> Thanks for posting this.

You're welcome.

> Is there a patch coming for CVE-2015-5221 as well?

I'll be happy to look into it if you send me a crasher.

--mancha (https://twitter.com/mancha140)

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ