MGASA-2020-0040 - Updated libjpeg packages fix security vulnerabilities

Publication date: 17 Jan 2020
URL: https://advisories.mageia.org/MGASA-2020-0040.html
Type: security
Affected Mageia releases: 7

The updated packages fix security vulnerabilities:

A signed integer overflow and subsequent segfault that occurred when
attempting to decompress images with more than 715827882 pixels using
the 64-bit C version of TJBench.

Out-of-bounds write in tjDecompressToYUV2() and tjDecompressToYUVPlanes()
(sometimes manifesting as a double free) that occurred when attempting to
decompress grayscale JPEG images that were compressed with a sampling
factor other than 1 (for instance, with cjpeg -grayscale -sample 2x2).

A regression introduced by 2.0.2[5] that caused the TurboJPEG API to
incorrectly identify some JPEG images with unusual sampling factors as
4:4:4 JPEG images. This was known to cause a buffer overflow when
attempting to decompress some such images using tjDecompressToYUV2()
or tjDecompressToYUVPlanes().

An issue, detected by ASan, whereby attempting to losslessly transform
a specially-crafted malformed JPEG image containing an extremely-high-
frequency coefficient block (junk image data that could never be
generated by a legitimate JPEG compressor) could cause the Huffman
encoder's local buffer to be overrun.

References:
- https://bugs.mageia.org/show_bug.cgi?id=26057
- https://github.com/libjpeg-turbo/libjpeg-turbo/releases/tag/2.0.4

SRPMS:
- 7/core/libjpeg-2.0.4-1.mga7