Name | CVE-2006-3005 |
Description | The JPEG library in media-libs/jpeg before 6b-r7 on Gentoo Linux is built without the -maxmem feature, which could allow context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted JPEG file that exceeds the intended memory limits. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 373672 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libjpeg6b (PTS) | sid | 1:6b2-3.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
libjpeg-mmx | source | (unstable) | (unfixed) | low | | 373672 |
libjpeg6b | source | (unstable) | (not affected) | | | |
Notes
- libjpeg6b <not-affected> (--maxmem is set during configure)
[sarge] - libjpeg-mmx <no-dsa> (If this poses a threat, the admin can apply resource limits)