Bug 1968036 (CVE-2020-17541) - CVE-2020-17541 libjpeg-turbo: Stack-based buffer overflow in the "transform" component
Summary: CVE-2020-17541 libjpeg-turbo: Stack-based buffer overflow in the "transform" ...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2020-17541
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1973139 1973141 1968037 1968038 1972289 1972290 1973137 1973138 1973140 1973142 1973143
Blocks: 1968039
TreeView+ depends on / blocked
 
Reported: 2021-06-04 18:39 UTC by Pedro Sampaio
Modified: 2025-04-04 12:56 UTC (History)
15 users (show)

Fixed In Version: libjpeg-turbo 2.0.4
Clone Of:
Environment:
Last Closed: 2021-07-21 03:26:36 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:4288 0 None None None 2021-11-09 18:04:26 UTC

Description Pedro Sampaio 2021-06-04 18:39:54 UTC
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.

References:

https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392

Comment 1 Pedro Sampaio 2021-06-04 18:40:32 UTC
Created libjpeg-turbo tracking bugs for this issue:

Affects: fedora-all [bug 1968037]


Created mingw-libjpeg-turbo tracking bugs for this issue:

Affects: fedora-all [bug 1968038]

Comment 8 Michael Johnson 2021-07-09 18:54:22 UTC
@fcanogab Since the package closed the issue, even though it has been fixed, do we still need to track this bug. Should we close?

Comment 14 errata-xmlrpc 2021-11-09 18:04:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:4288 https://access.redhat.com/errata/RHSA-2021:4288


Note You need to log in before you can comment on or make changes to this bug.