USN-5336-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-5336-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5336-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5336-1
Related
Published
2022-03-23T12:40:00.726468Z
Modified
2022-03-23T12:40:00.726468Z
Summary
libjpeg9 vulnerabilities
Details

Aladdin Mubaied discovered that the cjpeg utility in libjpeg9 did not properly validate the input image's size. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2016-3616)

It was discovered that the cjpeg utility in libjpeg9 incorrectly handled certain input. An attacker could possibly use these issues to cause a denial of service. (CVE-2018-11212, CVE-2018-11813, CVE-2020-14152, CVE-2020-14153)

It was discovered that the cjpeg utility in libjpeg9 incorrectly handled memory when supplied with certain input. An attacker could possibly use these issues to cause a denial of service or execute arbitrary code. (CVE-2018-11213, CVE-2018-11214)

References

Affected packages

Ubuntu:Pro:16.04:LTS / libjpeg9

Package

Name
libjpeg9
Purl
pkg:deb/ubuntu/libjpeg9@1:9b-1ubuntu1+esm1?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:9b-1ubuntu1+esm1

Affected versions

Other

1:9a-2ubuntu1
1:9b-1
1:9b-1ubuntu1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "libjpeg-progs": "1:9b-1ubuntu1+esm1",
            "libjpeg-progs-dbgsym": "1:9b-1ubuntu1+esm1",
            "libjpeg9-dbgsym": "1:9b-1ubuntu1+esm1",
            "libjpeg9-dev": "1:9b-1ubuntu1+esm1",
            "libjpeg9-dbg": "1:9b-1ubuntu1+esm1",
            "libjpeg9": "1:9b-1ubuntu1+esm1",
            "libjpeg9-dev-dbgsym": "1:9b-1ubuntu1+esm1"
        }
    ]
}