Updated libjpeg packages fix security vulnerabilities
Publication date: 17 Jan 2020Modification date: 17 Jan 2020
Type: security
Affected Mageia releases : 7
Description
The updated packages fix security vulnerabilities:
A signed integer overflow and subsequent segfault that occurred when
attempting to decompress images with more than 715827882 pixels using
the 64-bit C version of TJBench.
Out-of-bounds write in tjDecompressToYUV2() and tjDecompressToYUVPlanes()
(sometimes manifesting as a double free) that occurred when attempting to
decompress grayscale JPEG images that were compressed with a sampling
factor other than 1 (for instance, with cjpeg -grayscale -sample 2x2).
A regression introduced by 2.0.2[5] that caused the TurboJPEG API to
incorrectly identify some JPEG images with unusual sampling factors as
4:4:4 JPEG images. This was known to cause a buffer overflow when
attempting to decompress some such images using tjDecompressToYUV2()
or tjDecompressToYUVPlanes().
An issue, detected by ASan, whereby attempting to losslessly transform
a specially-crafted malformed JPEG image containing an extremely-high-
frequency coefficient block (junk image data that could never be
generated by a legitimate JPEG compressor) could cause the Huffman
encoder's local buffer to be overrun.
References
SRPMS
7/core
- libjpeg-2.0.4-1.mga7