Debian LTS: DLA-1638-1: libjpeg-turbo security update
Summary
Several vulnerabilities have been resolved in libjpeg-turbo, Debian's
default JPEG implemenation.
CVE-2016-3616
The cjpeg utility in libjpeg allowed remote attackers to cause a
denial of service (NULL pointer dereference and application crash) or
execute arbitrary code via a crafted file.
This issue got fixed by the same patch that fixed CVE-2018-11213 and
CVE-2018-11214.
CVE-2018-1152
libjpeg-turbo has been found vulnerable to a denial of service
vulnerability caused by a divide by zero when processing a crafted
BMP image. The issue has been resolved by a boundary check.
CVE-2018-11212
The alloc_sarray function in jmemmgr.c allowed remote attackers to
cause a denial of service (divide-by-zero error) via a crafted file.
The issue has been addressed by checking the image size when reading
a targa file and throwing an error when image width or height is 0.
CVE-2018-11213
CVE-2018-11214
The get_text_gray_row and get_text_rgb_row functions in rdppm.c both
allowed remote attackers to cause a denial of service (Segmentation
fault) via a crafted file.
By checking the range of integer values in PPM text files and adding
checks to ensure values are within the specified range, both issues
For Debian 8 "Jessie", these problems have been fixed in version
1:1.3.1-12+deb8u1.
We recommend that you upgrade your libjpeg-turbo packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
--
mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148
GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22 0782 9AF4 6B30 2577 1B31
mail: sunweaver@debian.org, https://sunweavers.net/
Package :libjpeg-turbo