libjpeg-turbo and mozjpeg is vulnerable to arbitrary code execution. A heap-based buffer over-read in get_rgb_row()
in rdppm.c
allows an attacker to execute arbitrary code on the host OS via a malicious PPM input file.
CPE | Name | Operator | Version |
---|---|---|---|
libjpeg-turbo:3.11 | eq | 2.0.4-r0 | |
libjpeg-turbo:3.10 | eq | 2.0.4-r0 | |
libjpeg-turbo:3.12 | eq | 2.0.4-r1 | |
libjpeg-turbo:edge | eq | 2.0.4-r1 |
lists.opensuse.org/opensuse-security-announce/2020-09/msg00031.html
lists.opensuse.org/opensuse-security-announce/2020-09/msg00062.html
github.com/libjpeg-turbo/libjpeg-turbo/commit/3de15e0c344d11d4b90f4a47136467053eb2d09a
github.com/libjpeg-turbo/libjpeg-turbo/issues/433
lists.debian.org/debian-lts-announce/2020/07/msg00033.html
lists.fedoraproject.org/archives/list/[email protected]/message/P4D6KNUY7YANSPH7SVQ44PJKSABFKAUB/
lists.fedoraproject.org/archives/list/[email protected]/message/U6563YHSVZK24MPJXGJVK3CQG7JVWZGK/
security.gentoo.org/glsa/202010-03
usn.ubuntu.com/4386-1/