Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 28 Aug 2015 04:34:56 +0000
From: mancha <mancha1@...o.com>
To: oss-security@...ts.openwall.com
Cc: feld@...d.me
Subject: Re: Double free corruption in JasPer JPEG-2000
 implementation (CVE-2015-5203)

On Mon, Aug 24, 2015 at 10:53:17AM -0500, Mark Felder wrote:
> 
> On Fri, Aug 21, 2015, at 09:58, mancha wrote:
> > On Sun, Aug 16, 2015 at 05:22:50PM +0200, Gustavo Grieco wrote:
> > > A new double free affecting JasPer JPEG-2000 (libjasper 1.900) has
> > > been found triggered by function jasper_image_stop_load.  Despite
> > > this library is used by many programs (
> > > http://www.ece.uvic.ca/~frodo/jasper/#overview), there is no one
> > > providing support, so there is no fix so far.
> > > 
> > > This vulnerability was found by QuickFuzz.
> > > 
> > > Regards, Gustavo.
> > 
> > Hi all.
> > 
> > This is the CVE-2015-5203 fix I shared with Gustavo:
> > 
> > http://sf.net/projects/mancha/files/sec/jasper-1.900.1_CVE-2015-5203.diff
> > 
> 
> Thanks for posting this.

You're welcome.

> Is there a patch coming for CVE-2015-5221 as well?

I'll be happy to look into it if you send me a crasher.

--mancha (https://twitter.com/mancha140)

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.