USN-5336-1: libjpeg9 vulnerabilities
23 March 2022
Several security issues were fixed in libjpeg9.
Releases
Packages
- libjpeg9 - Independent JPEG Group's JPEG runtime library
Details
Aladdin Mubaied discovered that the cjpeg utility in libjpeg9 did not properly
validate the input image's size. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2016-3616)
It was discovered that the cjpeg utility in libjpeg9 incorrectly handled
certain input. An attacker could possibly use these issues to cause a denial of
service. (CVE-2018-11212, CVE-2018-11813, CVE-2020-14152, CVE-2020-14153)
It was discovered that the cjpeg utility in libjpeg9 incorrectly handled
memory when supplied with certain input. An attacker could possibly use these
issues to cause a denial of service or execute arbitrary code.
(CVE-2018-11213, CVE-2018-11214)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
libjpeg-progs
-
1:9b-1ubuntu1+esm1
Available with Ubuntu Pro
-
libjpeg9
-
1:9b-1ubuntu1+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
Related notices
- USN-3706-2: libjpeg-turbo8, libjpeg-turbo
- USN-3706-1: libturbojpeg0-dev, libjpeg-turbo8, libjpeg-turbo, libturbojpeg, libjpeg-turbo-progs, libjpeg-turbo8-dev, libjpeg-turbo-test
- USN-5497-1: libjpeg6b, libjpeg62-dev, libjpeg62
- USN-5497-2: libjpeg6b, libjpeg62-dev, libjpeg62
- USN-5553-1: libjpeg-turbo8, libjpeg-turbo, libturbojpeg, libjpeg-turbo-progs, libjpeg-turbo8-dev, libjpeg-turbo-test
- USN-5631-1: libturbojpeg0-dev, libjpeg-turbo8, libjpeg-turbo, libturbojpeg, libjpeg-turbo-progs, libjpeg-turbo8-dev, libjpeg-turbo-test