Описание
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 1.5.2-0ubuntu5.18.04.6 |
| devel | not-affected | |
| esm-infra-legacy/trusty | released | 1.3.0-0ubuntu2.1+esm2 |
| esm-infra/bionic | released | 1.5.2-0ubuntu5.18.04.6 |
| esm-infra/focal | released | 2.0.3-0ubuntu1.20.04.3 |
| esm-infra/xenial | released | 1.4.2-0ubuntu3.4+esm1 |
| focal | released | 2.0.3-0ubuntu1.20.04.3 |
| groovy | ignored | end of life |
| hirsute | not-affected | |
| impish | not-affected |
Показывать по
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
Libjpeg-turbo all version have a stack-based buffer overflow in the "t ...
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3