Date: Fri, 28 Aug 2015 04:34:56 +0000 From: mancha <mancha1@...o.com> To: oss-security@...ts.openwall.com Cc: feld@...d.me Subject: Re: Double free corruption in JasPer JPEG-2000 implementation (CVE-2015-5203) On Mon, Aug 24, 2015 at 10:53:17AM -0500, Mark Felder wrote: > > On Fri, Aug 21, 2015, at 09:58, mancha wrote: > > On Sun, Aug 16, 2015 at 05:22:50PM +0200, Gustavo Grieco wrote: > > > A new double free affecting JasPer JPEG-2000 (libjasper 1.900) has > > > been found triggered by function jasper_image_stop_load. Despite > > > this library is used by many programs ( > > > http://www.ece.uvic.ca/~frodo/jasper/#overview), there is no one > > > providing support, so there is no fix so far. > > > > > > This vulnerability was found by QuickFuzz. > > > > > > Regards, Gustavo. > > > > Hi all. > > > > This is the CVE-2015-5203 fix I shared with Gustavo: > > > > http://sf.net/projects/mancha/files/sec/jasper-1.900.1_CVE-2015-5203.diff > > > > Thanks for posting this. You're welcome. > Is there a patch coming for CVE-2015-5221 as well? I'll be happy to look into it if you send me a crasher. --mancha (https://twitter.com/mancha140) [ CONTENT OF TYPE application/pgp-signature SKIPPED ]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ