Your submission was sent successfully! Close

USN-5497-1: Libjpeg6b vulnerabilities

30 June 2022

Several security issues were fixed in Libjpeg6b.

Releases

Packages

  • libjpeg6b - library for handling JPEG files

Details

It was discovered that Libjpeg6b was not properly performing bounds
checks when compressing PPM and Targa image files. An attacker could
possibly use this issue to cause a denial of service.
(CVE-2018-11212)

Chijin Zhou discovered that Libjpeg6b was incorrectly handling the
EOF character in input data when generating JPEG files. An attacker
could possibly use this issue to force the execution of a large loop,
force excessive memory consumption, and cause a denial of service.
(CVE-2018-11813)

Sheng Shu and Dongdong She discovered that Libjpeg6b was not properly
limiting the amount of memory being used when it was performing
decompression or multi-pass compression operations. An attacker could
possibly use this issue to force excessive memory consumption and
cause a denial of service. (CVE-2020-14152)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04

In general, a standard system update will make all the necessary changes.

Related notices

  • USN-3706-2: libjpeg-turbo8, libjpeg-turbo
  • USN-3706-1: libjpeg-turbo-test, libjpeg-turbo, libturbojpeg0-dev, libjpeg-turbo8, libturbojpeg, libjpeg-turbo8-dev, libjpeg-turbo-progs
  • USN-5553-1: libjpeg-turbo-test, libjpeg-turbo, libjpeg-turbo8, libturbojpeg, libjpeg-turbo8-dev, libjpeg-turbo-progs