Advisories ยป MGASA-2020-0040

Updated libjpeg packages fix security vulnerabilities

Publication date: 17 Jan 2020
Modification date: 17 Jan 2020
Type: security
Affected Mageia releases : 7

Description

The updated packages fix security vulnerabilities:

A signed integer overflow and subsequent segfault that occurred when
attempting to decompress images with more than 715827882 pixels using
the 64-bit C version of TJBench.

Out-of-bounds write in tjDecompressToYUV2() and tjDecompressToYUVPlanes()
(sometimes manifesting as a double free) that occurred when attempting to
decompress grayscale JPEG images that were compressed with a sampling
factor other than 1 (for instance, with cjpeg -grayscale -sample 2x2).

A regression introduced by 2.0.2[5] that caused the TurboJPEG API to
incorrectly identify some JPEG images with unusual sampling factors as
4:4:4 JPEG images. This was known to cause a buffer overflow when
attempting to decompress some such images using tjDecompressToYUV2()
or tjDecompressToYUVPlanes().

An issue, detected by ASan, whereby attempting to losslessly transform
a specially-crafted malformed JPEG image containing an extremely-high-
frequency coefficient block (junk image data that could never be
generated by a legitimate JPEG compressor) could cause the Huffman
encoder's local buffer to be overrun.
                

References

SRPMS

7/core