{"id":"USN-5497-1","summary":"libjpeg6b vulnerabilities","details":"It was discovered that Libjpeg6b was not properly performing bounds\nchecks when compressing PPM and Targa image files. An attacker could\npossibly use this issue to cause a denial of service.\n(CVE-2018-11212)\n\nChijin Zhou discovered that Libjpeg6b was incorrectly handling the\nEOF character in input data when generating JPEG files. An attacker\ncould possibly use this issue to force the execution of a large loop,\nforce excessive memory consumption, and cause a denial of service.\n(CVE-2018-11813)\n\nSheng Shu and Dongdong She discovered that Libjpeg6b was not properly\nlimiting the amount of memory being used when it was performing\ndecompression or multi-pass compression operations. An attacker could\npossibly use this issue to force excessive memory consumption and\ncause a denial of service. (CVE-2020-14152)\n","modified":"2026-02-10T04:42:40Z","published":"2022-06-30T12:54:31Z","related":["UBUNTU-CVE-2018-11212","UBUNTU-CVE-2018-11213","UBUNTU-CVE-2018-11214","UBUNTU-CVE-2018-11813","UBUNTU-CVE-2020-14152"],"upstream":["CVE-2018-11212","CVE-2018-11213","CVE-2018-11214","CVE-2018-11813","CVE-2020-14152","UBUNTU-CVE-2018-11212","UBUNTU-CVE-2018-11213","UBUNTU-CVE-2018-11214","UBUNTU-CVE-2018-11813","UBUNTU-CVE-2020-14152"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5497-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-11212"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-11213"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-11214"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-11813"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-14152"}],"affected":[{"package":{"name":"libjpeg6b","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/libjpeg6b@6b1-4ubuntu1+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6b1-4ubuntu1+esm1"}]}],"versions":["6b1-3ubuntu1","6b1-4ubuntu1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"libjpeg62","binary_version":"6b1-4ubuntu1+esm1"},{"binary_name":"libjpeg62-dev","binary_version":"6b1-4ubuntu1+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5497-1.json","cves_map":{"cves":[{"id":"CVE-2018-11212","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-11213","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-11214","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-11813","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2020-14152","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}}],"schema_version":"1.7.3"}