Bug 1398251 (CVE-2016-9557) - CVE-2016-9557 jasper: signed integer overflow in jas_image_create()
Summary: CVE-2016-9557 jasper: signed integer overflow in jas_image_create()
Alias: CVE-2016-9557
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1396987
Blocks: 1314477
TreeView+ depends on / blocked
Reported: 2016-11-24 10:49 UTC by Andrej Nemec
Modified: 2019-09-29 14:00 UTC (History)
28 users (show)

Fixed In Version: jasper 1.900.25
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2017-03-30 15:06:51 UTC

Attachments (Terms of Use)

Description Andrej Nemec 2016-11-24 10:49:57 UTC
An integer overflow vulnerability was found in jasper in jas_image.c triggered by parsing of a maliciously crafted file.

Upstream patch:




Comment 1 Andrej Nemec 2016-11-24 10:59:02 UTC
Created mingw-jasper tracking bugs for this issue:

Affects: fedora-all [bug 1396987]

Comment 2 Andrej Nemec 2016-11-24 10:59:18 UTC
Created jasper tracking bugs for this issue:

Affects: fedora-all [bug 1396986]

Comment 3 Tomas Hoger 2017-03-30 14:56:09 UTC
Upstream bug report:


Original reporter's advisory:


Relevant information from the advisory:

The undefined behavior sanitizer shows a signed integer overflow in jas_image.c
As you can see, the commit which fixes the issue is not a fix itself for the signed integer overflow, but changed a bit how, in jasper, the things work.

The complete UBSan output:

# imginfo -f $FILE
/tmp/portage/media-libs/jasper-1.900.17/work/jasper-1.900.17/src/libjasper/base/jas_image.c:162:49: runtime error: signed integer overflow: 8543608947741818625 * 15 cannot be represented in type 'long'

Affected version: 1.900.17

Fixed version: 1.900.25

Commit fix:

Comment 4 Tomas Hoger 2017-03-30 15:06:51 UTC
There is crash/abort when jasper is compiles with undefined behaviour sanitizer (ubsan) enabled.  That is a development tool aimed to identify possible code bugs related to undefined behaviour.  There is no crash for builds not using ubsan (as is the case for jasper packages in Red Hat Enterprise Linux and Fedora).

The integer overflow is in the code that computes an approximate memory requirement for the image to decide if date should be stored in memory on in a temporary file.  This bug could cause jasper to use memory storage when use of temporary file was intended.  The actual memory allocations are protected against integer overflows because of CVE-2015-5203 (bug 1254242) / CVE-2016-9262 (bug 1393882).

Upstream commit d42b238 changed the code to do the memory requirement estimate separately for each component, rather than as summary for all components.  Therefore, to trigger large memory use, the image needs to contain many components with size close to the threshold.

Not considering this security issue for non-ubsan builds.

Note You need to log in before you can comment on or make changes to this bug.