|Category:||SuSE Local Security Checks|
|Title:||openSUSE: Security Advisory for libjpeg-turbo (openSUSE-SU-2019:1343-1)|
|Summary:||The remote host is missing an update for the 'libjpeg-turbo'; package(s) announced via the openSUSE-SU-2019:1343-1 advisory.|
The remote host is missing an update for the 'libjpeg-turbo'
package(s) announced via the openSUSE-SU-2019:1343-1 advisory.
This update for libjpeg-turbo fixes the following issues:
The following security vulnerabilities were addressed:
- CVE-2018-14498: Fixed a heap-based buffer over read in get_8bit_row
function which could allow to an attacker to cause denial of service
- CVE-2018-11813: Fixed the end-of-file mishandling in read_pixel in
rdtarga.c, which allowed remote attackers to cause a denial-of-service
via crafted JPG files due to a large loop (bsc#1096209)
- CVE-2018-1152: Fixed a denial of service in start_input_bmp() rdbmp.c
caused by a divide by zero when processing a crafted BMP image
This update was imported from the SUSE:SLE-12:Update update project.
To install this openSUSE Security Update use the SUSE recommended
like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2019-1343=1
'libjpeg-turbo' package(s) on openSUSE Leap 42.3.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2018-1152|
BugTraq ID: 104543
SuSE Security Announcement: openSUSE-SU-2019:1118 (Google Search)
SuSE Security Announcement: openSUSE-SU-2019:1343 (Google Search)
|Copyright||Copyright (C) 2019 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.