Bug 1388864 (CVE-2016-8881)
Summary: | CVE-2016-8881 jasper: insufficient memory allocation in jpc_crg_getparms() (rejected duplicate of CVE-2011-4517) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED DUPLICATE | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | abhgupta, bmcclain, cfergeau, dblechte, dmcphers, eedri, erik-fedora, gklein, jialiu, jokerman, jridky, kseifried, lmeyer, lsurette, mgoldboi, michal.skrivanek, mike, mmccomas, rbalakri, rdieter, rh-spice-bugs, rjones, sherold, srevivo, tiwillia, ykaul, ylavi |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | jasper 1.900.5 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2016-12-15 13:03:05 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1388873, 1388874, 1388875, 1388876 | ||
Bug Blocks: | 1314477 |
Description
Adam Mariš
2016-10-26 10:33:45 UTC
Created mingw-jasper tracking bugs for this issue: Affects: fedora-all [bug 1388874] Affects: epel-7 [bug 1388876] Created jasper tracking bugs for this issue: Affects: fedora-all [bug 1388873] Affects: epel-5 [bug 1388875] This is duplicate of CVE-2011-4517 (bug 747726). The problem was in the jpc_crg_getparms() function, which incorrectly allocated memory for cstate->numcomps. When allocating memory, function assume that each item in the array has sizeof(uint_fast16_t). However, it later handled each item as being of type jpc_crgcomp_t, a structure containing two uint_fast16_t type variables. Therefore, it allocated approximately half of the required memory, leading to heap-based buffer overflow later. In Red Hat products, this issue was already corrected in previous updates for CVE-2011-4517. Problem was addressed upstream in version 1.900.5 via this commit: https://github.com/mdadams/jasper/commit/0d22460816ea58e74a124158fa6cc48efb709a47 This CVE was rejected by Mitre: Common Vulnerabilities and Exposures assigned an identifier CVE-2016-8881 to the following vulnerability: Name: CVE-2016-8881 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8881 Assigned: 20161022 ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4517. Reason: This candidate is a duplicate of CVE-2011-4517. Notes: All CVE users should reference CVE-2011-4517 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. Statement: This flaw was found to be a duplicate of CVE-2011-4517. Please see https://access.redhat.com/security/cve/CVE-2011-4517 for information about affected products and security errata. *** This bug has been marked as a duplicate of bug 747726 *** |