Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <c3f3c2ec-aee4-75db-562c-7183fa0e3a29@oracle.com>
Date: Mon, 7 Aug 2017 14:05:08 +0100
From: John Haxby <john.haxby@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Re: Cve issue discussion

On 07/08/17 13:47, Glenn Randers-Pehrson wrote:
> It's not causing a crash, just a delay.  You'll safely get either an OOM
> message or an EOF message.and no memory leak.
> 

That's scant comfort when your browser is the one hit by the OOM killer
and then again when you restart it.  And also while you're wondering
what's going on because your laptop is basically completely
non-responsive ...

So yes, it's a remote DoS and definitely worth a CVE.  We have had other
similar CVEs in the past with image handling libraries not being
sufficiently paranoid.

jch

> Glenn
> 
> On Mon, Aug 7, 2017 at 8:37 AM, Marcus Meissner <meissner@...e.de> wrote:
>> Hi,
>>
>> if it could crash the image reader I would consider it "remote denial of service"
>> classed and CVE worthy.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.