Bug 1472888 - (CVE-2017-1000050) CVE-2017-1000050 jasper: NULL pointer exception in jp2_encode()
CVE-2017-1000050 jasper: NULL pointer exception in jp2_encode()
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20170305,reported=2...
: Security
Depends On: 1434464 1434465 1585830 1434467
Blocks: 1449402
  Show dependency treegraph
 
Reported: 2017-07-19 11:20 EDT by Andrej Nemec
Modified: 2018-06-04 16:49 EDT (History)
17 users (show)

See Also:
Fixed In Version: jasper 2.0.13
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Andrej Nemec 2017-07-19 11:20:48 EDT
JasPer is vulnerable to a NULL pointer exception in the function jp2_encode which failed to check to see if the image contained at least one component resulting in a denial-of-service.

References:

http://www.openwall.com/lists/oss-security/2017/03/06/1
Comment 1 Andrej Nemec 2017-07-19 11:21:55 EDT
Created jasper tracking bugs for this issue:

Affects: fedora-all [bug 1434464]


Created mingw-jasper tracking bugs for this issue:

Affects: epel-7 [bug 1434465]
Affects: fedora-all [bug 1434467]
Comment 2 Tomas Hoger 2017-08-24 08:11:00 EDT
Upstream bug report:

https://github.com/mdadams/jasper/issues/120

Upstream commit:

https://github.com/mdadams/jasper/commit/58ba0365d911b9f9dd68e9abf826682c0b4f2293

The fix is included in version 2.0.13.

This bug is in encoder, therefore applications that only use jasper to read JPEG2000 images are not affected, it only affects applications that read untrusted images and convert them to JPEG2000 format using jasper.

Note You need to log in before you can comment on or make changes to this bug.