Bug 1968036 (CVE-2020-17541) - CVE-2020-17541 libjpeg-turbo: Stack-based buffer overflow in the "transform" component
Summary: CVE-2020-17541 libjpeg-turbo: Stack-based buffer overflow in the "transform" ...
Alias: CVE-2020-17541
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1973139 1973141 1968037 1968038 1972289 1972290 1973137 1973138 1973140 1973142 1973143
Blocks: 1968039
TreeView+ depends on / blocked
Reported: 2021-06-04 18:39 UTC by Pedro Sampaio
Modified: 2021-11-09 18:04 UTC (History)
15 users (show)

Fixed In Version: libjpeg-turbo 2.0.4
Doc Type: If docs needed, set a value
Doc Text:
A stack-based buffer overflow flaw was found in libjpeg-turbo library in the tranform component. An attacker may use this flaw to input a malicious image file to an application utilizing this library, leading to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Clone Of:
Last Closed: 2021-07-21 03:26:36 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:4288 0 None None None 2021-11-09 18:04:26 UTC

Description Pedro Sampaio 2021-06-04 18:39:54 UTC
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.



Comment 1 Pedro Sampaio 2021-06-04 18:40:32 UTC
Created libjpeg-turbo tracking bugs for this issue:

Affects: fedora-all [bug 1968037]

Created mingw-libjpeg-turbo tracking bugs for this issue:

Affects: fedora-all [bug 1968038]

Comment 8 Michael Johnson 2021-07-09 18:54:22 UTC
@fcanogab Since the package closed the issue, even though it has been fixed, do we still need to track this bug. Should we close?

Comment 14 errata-xmlrpc 2021-11-09 18:04:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:4288 https://access.redhat.com/errata/RHSA-2021:4288

Note You need to log in before you can comment on or make changes to this bug.