CVE-2021-20205:
Libjpeg-turbo versions 2.0.91 and 2.0.90 is vulnerable to a denial of service vulnerability...
6.5
Basic Information
Technical Details
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is a divide-by-zero error when processing a GIF with zero width or height. The provided commit 1719d12e51641cce5c77e259516649ba5ef6303c
patches the start_input_gif
function in rdgif.c
. The patch explicitly adds checks for width == 0 || height == 0
after reading these values from the GIF header. If either is zero, the function now exits with an error JERR_GIF_EMPTY
. This directly indicates that the start_input_gif
function was the entry point for the vulnerable condition, as it was responsible for reading these dimensions and, without the patch, would allow processing to continue with these invalid values, leading to a subsequent divide-by-zero. The Bugzilla report also confirms that the issue was in cjpeg
when processing a crafted GIF, and rdgif.c
contains GIF reading functionalities used by cjpeg
.