{"id":"USN-5497-2","summary":"libjpeg6b vulnerabilities","details":"USN-5497-1 fixed vulnerabilities in Libjpeg6b. This update provides\nthe corresponding updates for Ubuntu 16.04 ESM.\n\nOriginal advisory details:\n\n It was discovered that Libjpeg6b was not properly performing bounds\n checks when compressing PPM and Targa image files. An attacker could\n possibly use this issue to cause a denial of service.\n (CVE-2018-11212)\n\n Chijin Zhou discovered that Libjpeg6b was incorrectly handling the\n EOF character in input data when generating JPEG files. An attacker\n could possibly use this issue to force the execution of a large loop,\n force excessive memory consumption, and cause a denial of service.\n (CVE-2018-11813)\n\n Sheng Shu and Dongdong She discovered that Libjpeg6b was not properly\n limiting the amount of memory being used when it was performing\n decompression or multi-pass compression operations. An attacker could\n possibly use this issue to force excessive memory consumption and\n cause a denial of service. (CVE-2020-14152)\n","modified":"2026-02-10T04:42:40Z","published":"2022-06-30T14:35:28Z","related":["UBUNTU-CVE-2018-11212","UBUNTU-CVE-2018-11213","UBUNTU-CVE-2018-11214","UBUNTU-CVE-2018-11813","UBUNTU-CVE-2020-14152"],"upstream":["CVE-2018-11212","CVE-2018-11213","CVE-2018-11214","CVE-2018-11813","CVE-2020-14152","UBUNTU-CVE-2018-11212","UBUNTU-CVE-2018-11213","UBUNTU-CVE-2018-11214","UBUNTU-CVE-2018-11813","UBUNTU-CVE-2020-14152"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5497-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-11212"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-11213"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-11214"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-11813"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-14152"}],"affected":[{"package":{"name":"libjpeg6b","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/libjpeg6b@1:6b2-2ubuntu0.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:6b2-2ubuntu0.1~esm1"}]}],"versions":["1:6b2-2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"1:6b2-2ubuntu0.1~esm1","binary_name":"libjpeg62"},{"binary_version":"1:6b2-2ubuntu0.1~esm1","binary_name":"libjpeg62-dev"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-11212","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-11213","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-11214","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-11813","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2020-14152","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5497-2.json"}}],"schema_version":"1.7.3"}