First published: Mon Jun 15 2020(Updated: )
In IJG JPEG (aka libjpeg) before 9d, jpeg_mem_available() in jmemnobs.c in djpeg does not honor the max_memory_to_use setting, possibly causing excessive memory consumption.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ijg Libjpeg | <9d | |
Debian Debian Linux | =9.0 | |
debian/libjpeg-turbo | 1:2.0.6-4 1:2.1.5-2 1:2.1.5-3 | |
debian/libjpeg9 | 1:9f-1 |
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/da2a27ef056a0179cbd80f9146e58b89403d9933
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-14152.
The title of this vulnerability is 'In IJG JPEG (aka libjpeg) before 9d jpeg_mem_available() in jmemnobs.c in djpeg does not honor the m…'
The severity level of CVE-2020-14152 is high with a CVSS score of 7.1.
The affected software versions include libjpeg-turbo 1:1.5.2-2+deb10u1, libjpeg-turbo 1:2.0.6-4, libjpeg-turbo 1:2.1.5-2, libjpeg9 1:9e-1, libjpeg-turbo 1.3.0-0ubuntu2.1+ (qualifiers: trusty), libjpeg-turbo 1:1.5.1-2+ to 1:1.5.2-2+ (qualifiers: upstream), libjpeg-turbo 1.4.2-0ubuntu3.4+ (qualifiers: xenial), libjpeg9 1:9 (qualifiers: xenial), libjpeg9 9 (qualifiers: upstream), libjpeg6b 6 (qualifiers: trusty), and libjpeg6b 1:6 (qualifiers: xenial).
To fix CVE-2020-14152, you should update your libjpeg or libjpeg-turbo package to the recommended versions provided by your respective operating system distribution.