Bug 1968036 (CVE-2020-17541)

Summary: CVE-2020-17541 libjpeg-turbo: Stack-based buffer overflow in the "transform" component
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: erik-fedora, fcanogab, gkamathe, kaycoth, klember, manisandro, micjohns, negativo17, nforro, phracek, pwayper, rh-spice-bugs, rjones, vmugicag, vonsch
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: libjpeg-turbo 2.0.4 Doc Type: If docs needed, set a value
Doc Text:
A stack-based buffer overflow flaw was found in libjpeg-turbo library in the tranform component. An attacker may use this flaw to input a malicious image file to an application utilizing this library, leading to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-07-21 03:26:36 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1973139, 1973141, 1968037, 1968038, 1972289, 1972290, 1973137, 1973138, 1973140, 1973142, 1973143    
Bug Blocks: 1968039    

Description Pedro Sampaio 2021-06-04 18:39:54 UTC
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.



Comment 1 Pedro Sampaio 2021-06-04 18:40:32 UTC
Created libjpeg-turbo tracking bugs for this issue:

Affects: fedora-all [bug 1968037]

Created mingw-libjpeg-turbo tracking bugs for this issue:

Affects: fedora-all [bug 1968038]

Comment 8 Michael Johnson 2021-07-09 18:54:22 UTC
@fcanogab Since the package closed the issue, even though it has been fixed, do we still need to track this bug. Should we close?

Comment 14 errata-xmlrpc 2021-11-09 18:04:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:4288 https://access.redhat.com/errata/RHSA-2021:4288