Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2018-10126

Publication date 21 April 2018

Last updated 7 September 2024


Ubuntu priority

Cvss 3 Severity Score

6.5 · Medium

Score breakdown

LibTIFF 4.0.9 has a NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c.

Read the notes from the security team

Status

Package Ubuntu Release Status
libjpeg-turbo 24.04 LTS noble
Needs evaluation
22.04 LTS jammy
Needs evaluation
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty
Needs evaluation
libjpeg6b 24.04 LTS noble
Needs evaluation
22.04 LTS jammy
Needs evaluation
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty
Needs evaluation
libjpeg9 24.04 LTS noble
Needs evaluation
22.04 LTS jammy
Needs evaluation
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
tiff 24.04 LTS noble
Not affected
23.10 mantic Ignored
23.04 lunar Ignored
22.10 kinetic Ignored
22.04 LTS jammy
Not affected
21.10 impish Ignored
21.04 hirsute Ignored
20.10 groovy Ignored
20.04 LTS focal
Not affected
19.10 eoan Ignored
19.04 disco Ignored
18.10 cosmic Ignored
18.04 LTS bionic
Not affected
17.10 artful Ignored
16.04 LTS xenial
Not affected
14.04 LTS trusty
Not affected

Notes


mdeslaur

as of 2022-03-04, no upstream fix


ccdm94

as of 2022-11-24, no upstream fix is available. A comment has been made in the issue bug requesting that the issue be closed given that for ijg-libjpeg versions after 9c the vulnerability seems to not be reproducible with the provided PoC file. A discussion on whether this is a libtiff issue or a libjpeg issue can be seen in a few comments in the bug report. The vulnerability also does not reproduce in xenial nor does it reproduce in kinetic.


eslerm

the correct upstream is ijg

Severity score breakdown

Parameter Value
Base score 6.5 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H