USN-5631-1: libjpeg-turbo vulnerabilities
- Canonical Ubuntu 18.04
It was discovered that libjpeg-turbo incorrectly handled certain EOF characters. An attacker could possibly use this issue to cause libjpeg-turbo to consume resource, leading to a denial of service. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-11813) It was discovered that libjpeg-turbo incorrectly handled certain malformed jpeg files. An attacker could possibly use this issue to cause libjpeg-turbo to crash, resulting in a denial of service. (CVE-2020-17541, CVE-2020-35538) It was discovered that libjpeg-turbo incorrectly handled certain malformed PPM files. An attacker could use this issue to cause libjpeg-turbo to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-46822) Update Instructions: Run `sudo ua fix USN-5631-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libturbojpeg0-dev – 2.0.3-0ubuntu1.20.04.3 libjpeg-turbo8-dev – 2.0.3-0ubuntu1.20.04.3 libjpeg-turbo-progs – 2.0.3-0ubuntu1.20.04.3 libturbojpeg – 2.0.3-0ubuntu1.20.04.3 libjpeg-turbo8 – 2.0.3-0ubuntu1.20.04.3 libjpeg-turbo-test – 2.0.3-0ubuntu1.20.04.3 No subscription required
CVEs contained in this USN include: CVE-2018-11813, CVE-2020-17541, CVE-2020-35538, CVE-2021-46822.
Affected Cloud Foundry Products and Versions
Severity is medium unless otherwise noted.
- All versions prior to 0.326.0
- CF Deployment
- All versions prior to 21.11.0
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
- Upgrade all versions to 0.326.0 or greater
- CF Deployment
- Upgrade all versions to 21.11.0 or greater
2022-09-29: Initial vulnerability report published.