Summary: | <media-libs/libjpeg-turbo-1.2.1: Heap-based buffer overflow when decompressing corrupt JPEG images (CVE-2012-2806) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | taaroa <taaroa> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=826849 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
taaroa
2012-07-17 05:29:34 UTC
Test and stabilize: =media-libs/libjpeg-turbo-1.2.1 alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86 btw, this is the same fix that Samuli added to libjpeg-turbo-1.2.0-r2 x86 stable Stable for HPPA. amd64 done alpha/arm/ia64/m68k/s390/sh/sparc stable ppc/ppc64 done all arch's done Thanks, everyone. GLSA draft ready for review. CVE-2012-2806 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2806): Heap-based buffer overflow in the get_sos function in jdmarker.c in libjpeg-turbo 1.2.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large component count in the header of a JPEG image. This issue was resolved and addressed in GLSA 201209-13 at http://security.gentoo.org/glsa/glsa-201209-13.xml by GLSA coordinator Sean Amoss (ackle). |