[USN-3706-2] libjpeg-turbo vulnerabilities


–===============7977194559974067165==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-/4C7ESGi/2KHSa1mea1B”

–=-/4C7ESGi/2KHSa1mea1B
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3706-2
July 10, 2018

libjpeg-turbo vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

libjpeg-turbo could be made to crash or run programs as your login if
it opened a specially crafted file.

Software Description:
– libjpeg-turbo: library for handling JPEG files

Details:

USN-3706-1 fixed a vulnerability in libjpeg-turbo. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0It was discovered that libjpeg-turbo incorrectly handled certain
=C2=A0malformed JPEG images. If a user or automated system were tricked int=
o
=C2=A0opening a specially crafted JPEG image, a remote attacker could cause
=C2=A0libjpeg-turbo to crash, resulting in a denial of service, or possibly
=C2=A0execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 libjpeg-turbo8=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A01.1.90+svn733-0ubuntu=
4.5

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3706-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3706-1
=C2=A0 CVE-2014-9092, CVE-2016-3616, CVE-2018-11212, CVE-2018-11213,
=C2=A0 CVE-2018-11214, CVE-2018-1152
–=-/4C7ESGi/2KHSa1mea1B
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=qeDM
—–END PGP SIGNATURE—–

–=-/4C7ESGi/2KHSa1mea1B–

–===============7977194559974067165==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============7977194559974067165==–