Hash: SHA512

Package        : jasper
Version        : 1.900.1-13+deb7u6
CVE ID         : CVE-2016-9591 CVE-2016-10251


CVE-2016-9591
      Use-after-free on heap in jas_matrix_destroy
      The vulnerability exists in code responsible for re-encoding the
      decoded input image file to a JP2 image. The vulnerability is
      caused by not setting related pointers to be null after the
      pointers are freed (i.e. missing Setting-Pointer-Null operations
      after free). The vulnerability can further cause double-free.

CVE-2016-10251
      Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in
      JasPer before 1.900.20 allows remote attackers to have unspecified
      impact via a crafted file, which triggers use of an uninitialized
      value.

Additional
      fix for TEMP-CVE from last upload to avoid hassle with SIZE_MAX


For Debian 7 "Wheezy", these problems have been fixed in version
1.900.1-13+deb7u6.

We recommend that you upgrade your jasper packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-920-1: jasper security update

April 26, 2017
CVE-2016-9591 Use-after-free on heap in jas_matrix_destroy The vulnerability exists in code responsible for re-encoding the

Summary

CVE-2016-9591
Use-after-free on heap in jas_matrix_destroy
The vulnerability exists in code responsible for re-encoding the
decoded input image file to a JP2 image. The vulnerability is
caused by not setting related pointers to be null after the
pointers are freed (i.e. missing Setting-Pointer-Null operations
after free). The vulnerability can further cause double-free.

CVE-2016-10251
Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in
JasPer before 1.900.20 allows remote attackers to have unspecified
impact via a crafted file, which triggers use of an uninitialized
value.

Additional
fix for TEMP-CVE from last upload to avoid hassle with SIZE_MAX


For Debian 7 "Wheezy", these problems have been fixed in version
1.900.1-13+deb7u6.

We recommend that you upgrade your jasper packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found ...

Read the Full Advisory


Severity
Package : jasper
Version : 1.900.1-13+deb7u6
CVE ID : CVE-2016-9591 CVE-2016-10251

Related News