|
Message-ID: <c3f3c2ec-aee4-75db-562c-7183fa0e3a29@oracle.com> Date: Mon, 7 Aug 2017 14:05:08 +0100 From: John Haxby <john.haxby@...cle.com> To: oss-security@...ts.openwall.com Subject: Re: Cve issue discussion On 07/08/17 13:47, Glenn Randers-Pehrson wrote: > It's not causing a crash, just a delay. You'll safely get either an OOM > message or an EOF message.and no memory leak. > That's scant comfort when your browser is the one hit by the OOM killer and then again when you restart it. And also while you're wondering what's going on because your laptop is basically completely non-responsive ... So yes, it's a remote DoS and definitely worth a CVE. We have had other similar CVEs in the past with image handling libraries not being sufficiently paranoid. jch > Glenn > > On Mon, Aug 7, 2017 at 8:37 AM, Marcus Meissner <meissner@...e.de> wrote: >> Hi, >> >> if it could crash the image reader I would consider it "remote denial of service" >> classed and CVE worthy.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.