Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix: Potential Vulnerability in Cloned Function #3058

Merged
merged 1 commit into from
Feb 27, 2025

Conversation

tabudz
Copy link
Contributor

@tabudz tabudz commented Feb 24, 2025

Description
This PR fixes a security vulnerability in start_input_tga() that was cloned from libjpeg-turbo but did not receive the security patch. The original issue was reported and fixed under libjpeg-turbo/libjpeg-turbo@82923eb.
This PR applies the same patch to eliminate the vulnerability.

References
https://nvd.nist.gov/vuln/detail/CVE-2018-11212
libjpeg-turbo/libjpeg-turbo@82923eb

Throw an error when image width or height is 0.

Fixes mozilla/mozjpeg#140, closes davisking#7.
@davisking
Copy link
Owner

Nice, thanks for the fix.

@davisking davisking merged commit 8dab9c3 into davisking:master Feb 27, 2025
10 checks passed
@tabudz
Copy link
Contributor Author

tabudz commented Feb 27, 2025

Hi @davisking, thanks for merging my PR. Just want to let you know that I plan to report this as a CVE. Let me know if you have any concern!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants