In read_and_discard_scanlines of jdapistd.c, there is a possible null pointer exception due to a missing NULL check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Reference: https://github.com/libjpeg-turbo/libjpeg-turbo/issues/470 Upstream patch: https://github.com/libjpeg-turbo/libjpeg-turbo/commit/6d2e8837b440ce4d8befd805a5abc0d351028d70
Created libjpeg-turbo tracking bugs for this issue: Affects: fedora-all [bug 1938346] Created mingw-libjpeg-turbo tracking bugs for this issue: Affects: fedora-all [bug 1938347]
Statement: Red Hat Product Security does not consider this to be a vulnerability. It is not practically exploitable.