Hi Salvatore,

Am Thu, Jul 27, 2017 at 07:03:18PM +0200, schrieb Salvatore Bonaccorso:
> Source: libjpeg-turbo
> Version: 1:1.3.1-12
> Severity: important
> Tags: upstream security
> 
> Hi,
> 
> the following vulnerability was published for libjpeg-turbo.
> 
> CVE-2017-9614[0]:
> | The fill_input_buffer function in jdatasrc.c in libjpeg-turbo 1.5.1
> | allows remote attackers to cause a denial of service (invalid memory
> | access and application crash) or possibly have unspecified other impact
> | via a crafted jpg file.
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2017-9614
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9614
> [1] http://seclists.org/fulldisclosure/2017/Jul/66
> 
> Please adjust the affected versions in the BTS as needed.
> 
> Could you please as well check this if it's preported upstream?
> 
> Regards,
> Salvatore
> 

Can we close this bug for libjpeg-turbo? According to the upstream issue
[1] this is not caused by libjpeg-turbo.

[1] https://github.com/libjpeg-turbo/libjpeg-turbo/issues/167

Mike

-- 

DAS-NETZWERKTEAM
Mike Gabriel, Herweg 7, 24357 Fleckeby
fon: +49 (1520) 1976 148

GnuPG Key ID 0x9AF46B3025771B31
mail: [email protected], http://das-netzwerkteam.de

Attachment: signature.asc
Description: PGP signature

Reply via email to