|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for libjpeg-turbo (DLA-2302-1)|
|Summary:||The remote host is missing an update for the 'libjpeg-turbo'; package(s) announced via the DLA-2302-1 advisory.|
The remote host is missing an update for the 'libjpeg-turbo'
package(s) announced via the DLA-2302-1 advisory.
Several vulnerabilities were fixed in libjpeg-turbo,
a widely used library for handling JPEG files.
Denial of service vulnerability caused by a divide by zero when
processing a crafted BMP image in TJBench.
Denial of service (heap-based buffer over-read and application
crash) via a crafted 8-bit BMP in which one or more of the color
indices is out of range for the number of palette entries.
Heap-based buffer over-read via a malformed PPM input file.
jpeg_mem_available() did not honor the max_memory_to_use setting,
possibly causing excessive memory consumption.
'libjpeg-turbo' package(s) on Debian Linux.
For Debian 9 stretch, these problems have been fixed in version
We recommend that you upgrade your libjpeg-turbo packages.
Common Vulnerability Exposure (CVE) ID: CVE-2018-1152|
BugTraq ID: 104543
SuSE Security Announcement: openSUSE-SU-2019:1118 (Google Search)
SuSE Security Announcement: openSUSE-SU-2019:1343 (Google Search)
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.