{"id":"USN-5553-1","summary":"libjpeg-turbo vulnerabilities","details":"It was discovered that libjpeg-turbo was not properly handling EOF characters,\nwhich could lead to excessive memory consumption through the execution of a\nlarge loop. An attacker could possibly use this issue to cause a denial of\nservice. (CVE-2018-11813)\n\nIt was discovered that libjpeg-turbo was not properly performing bounds\ncheck operations, which could lead to a heap-based buffer overread. If a user\nor automated system were tricked into opening a specially crafted file, an\nattacker could possibly use this issue to cause a denial of service. This\nissue only affected Ubuntu 14.04 ESM. (CVE-2018-14498)\n\nIt was discovered that libjpeg-turbo was not properly limiting the amount of\nmain memory being consumed by the system during decompression or multi-pass\ncompression operations, which could lead to excessive memory consumption. An\nattacker could possibly use this issue to cause a denial of service.\n(CVE-2020-14152)\n\nIt was discovered that libjpeg-turbo was not properly setting variable sizes\nwhen performing certain kinds of encoding operations, which could lead to a\nstack-based buffer overflow. If a user or automated system were tricked into\nopening a specially crafted file, an attacker could possibly use this issue to\ncause a denial of service. (CVE-2020-17541)\n","modified":"2026-02-10T04:42:43Z","published":"2022-08-08T12:06:20Z","related":["UBUNTU-CVE-2018-11813","UBUNTU-CVE-2018-14498","UBUNTU-CVE-2020-14152","UBUNTU-CVE-2020-17541"],"upstream":["CVE-2018-11813","CVE-2018-14498","CVE-2020-14152","CVE-2020-17541","UBUNTU-CVE-2018-11813","UBUNTU-CVE-2018-14498","UBUNTU-CVE-2020-14152","UBUNTU-CVE-2020-17541"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5553-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-11813"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14498"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-14152"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-17541"}],"affected":[{"package":{"name":"libjpeg-turbo","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/libjpeg-turbo@1.3.0-0ubuntu2.1+esm2?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.0-0ubuntu2.1+esm2"}]}],"versions":["1.3.0-0ubuntu1","1.3.0-0ubuntu2","1.3.0-0ubuntu2.1","1.3.0-0ubuntu2.1+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.0-0ubuntu2.1+esm2","binary_name":"libjpeg-turbo-progs"},{"binary_version":"1.3.0-0ubuntu2.1+esm2","binary_name":"libjpeg-turbo-test"},{"binary_version":"1.3.0-0ubuntu2.1+esm2","binary_name":"libjpeg-turbo8"},{"binary_version":"1.3.0-0ubuntu2.1+esm2","binary_name":"libjpeg-turbo8-dev"},{"binary_version":"1.3.0-0ubuntu2.1+esm2","binary_name":"libturbojpeg"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5553-1.json","cves_map":{"cves":[{"id":"CVE-2018-11813","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-14498","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-14152","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-17541","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}},{"package":{"name":"libjpeg-turbo","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/libjpeg-turbo@1.4.2-0ubuntu3.4+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.2-0ubuntu3.4+esm1"}]}],"versions":["1.3.0-0ubuntu2","1.4.2-0ubuntu1","1.4.2-0ubuntu2","1.4.2-0ubuntu3","1.4.2-0ubuntu3.1","1.4.2-0ubuntu3.3","1.4.2-0ubuntu3.4"],"ecosystem_specific":{"binaries":[{"binary_version":"1.4.2-0ubuntu3.4+esm1","binary_name":"libjpeg-turbo-progs"},{"binary_version":"1.4.2-0ubuntu3.4+esm1","binary_name":"libjpeg-turbo-test"},{"binary_version":"1.4.2-0ubuntu3.4+esm1","binary_name":"libjpeg-turbo8"},{"binary_version":"1.4.2-0ubuntu3.4+esm1","binary_name":"libjpeg-turbo8-dev"},{"binary_version":"1.4.2-0ubuntu3.4+esm1","binary_name":"libturbojpeg"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5553-1.json","cves_map":{"cves":[{"id":"CVE-2018-11813","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-14152","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-17541","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}}],"schema_version":"1.7.3"}