Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
Created libjpeg-turbo tracking bugs for this issue:
Affects: fedora-all [bug 1968037]
Created mingw-libjpeg-turbo tracking bugs for this issue:
Affects: fedora-all [bug 1968038]
@fcanogab Since the package closed the issue, even though it has been fixed, do we still need to track this bug. Should we close?
This issue has been addressed in the following products:
Red Hat Enterprise Linux 8
Via RHSA-2021:4288 https://access.redhat.com/errata/RHSA-2021:4288