Resource Exhaustion Affecting turbojpeg package, versions *


Severity

Recommended
low

Based on CentOS security rating.

Threat Intelligence

EPSS
0.08% (37th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Resource Exhaustion vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CENTOS7-TURBOJPEG-1995579
  • published26 Jul 2021
  • disclosed18 Jul 2019

Introduced: 18 Jul 2019

CVE-2019-13960  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

There is no fixed version for Centos:7 turbojpeg.

NVD Description

Note: Versions mentioned in the description apply only to the upstream turbojpeg package and not the turbojpeg package as distributed by Centos. See How to fix? for Centos:7 relevant fixed versions and status.

In libjpeg-turbo 2.0.2, a large amount of memory can be used during processing of an invalid progressive JPEG image containing incorrect width and height values in the image header. NOTE: the vendor's expectation, for use cases in which this memory usage would be a denial of service, is that the application should interpret libjpeg warnings as fatal errors (aborting decompression) and/or set limits on resource consumption or image sizes