First published: Mon Aug 17 2015(Updated: )
A double free flaw was found in the way JasPer's jasper_image_stop_load() function parsed certain JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash. Original report: <a href="http://seclists.org/oss-sec/2015/q3/366">http://seclists.org/oss-sec/2015/q3/366</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jasper | ||
redhat/jasper | <1.900.22 | 1.900.22 |
Fedora | =23 | |
Fedora | =24 | |
Fedora | =25 | |
openSUSE | =42.2 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
openSUSE Leap | =42.1 | |
Jasper Reports | =1.900.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-5203 is classified as a high-risk vulnerability due to the potential for application crashes.
To fix CVE-2015-5203, update the jasper package to version 1.900.22 or later where applicable.
CVE-2015-5203 affects Jasper versions prior to 1.900.22, including 1.900.17 and earlier.
CVE-2015-5203 is a double free flaw found in the jasper_image_stop_load() function.
CVE-2015-5203 does not lead to remote code execution but can cause application crashes when processing specially crafted JPEG 2000 files.