|
Message-ID: <CACn5sdSnp7LMeeV_rFbgVQCeQkoqGGTvHLZ3Xo_xgU70bhbOYw@mail.gmail.com> Date: Sun, 16 Aug 2015 17:22:50 +0200 From: Gustavo Grieco <gustavo.grieco@...il.com> To: oss-security@...ts.openwall.com Subject: Double free corruption in JasPer JPEG-2000 implementation (CVE-2015-5203) A new double free affecting JasPer JPEG-2000 (libjasper 1.900) has been found triggered by function jasper_image_stop_load. Despite this library is used by many programs ( http://www.ece.uvic.ca/~frodo/jasper/#overview), there is no one providing support, so there is no fix so far. This vulnerability was found by QuickFuzz. Regards, Gustavo.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.