Summary: | CVE-2018-1152 libjpeg-turbo: Divide by zero allows for denial of service via crafted BMP image | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | erik-fedora, klember, negativo17, nforro, phracek, rjones, vonsch |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:29:43 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Bug Depends On: | 1593555, 1593556, 1593557, 1593558 | ||
Bug Blocks: | 1593560 |
Description
Sam Fowler
2018-06-21 05:13:28 UTC
Created libjpeg-turbo tracking bugs for this issue: Affects: fedora-all [bug 1593555] Created mingw-libjpeg-turbo tracking bugs for this issue: Affects: epel-all [bug 1593556] Created mingw-libjpeg-turbo tracking bugs for this issue: Affects: epel-7 [bug 1593558] The floating point exception actually happens in the "alloc_sarray()" function, although the patch adds checks to "start_input_bmp()" function. The cjpeg binaries we ship in RHEL7 refuse to load the specially crafted BMP file. It seems like the only obvious vector is via the "tjLoadImage()" function, which was added to 2.x versions and is not yet available in versions we ship in RHEL6/7. Statement: This issue did not affect the versions of libjpeg-turbo as shipped with Red Hat Enterprise Linux 6 and 7. |