forked from bromite/bromite
-
Notifications
You must be signed in to change notification settings - Fork 91
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update cve list for libjxl
- Loading branch information
Showing
1 changed file
with
218 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1,218 @@ | ||
empty | ||
No CVEs found | ||
|
||
ID: CVE-2021-22563 | ||
DATE: 2021-11-01T13:15Z | ||
IMPACT: | ||
Base Score: 4.4 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L | ||
|
||
DESC: Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector<std::vector<T>> when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/757 | ||
--- | ||
|
||
ID: CVE-2021-22564 | ||
DATE: 2021-11-01T13:15Z | ||
IMPACT: | ||
Base Score: 5.5 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | ||
|
||
DESC: For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775 | ||
--- | ||
|
||
ID: CVE-2021-27804 | ||
DATE: 2021-03-02T01:15Z | ||
IMPACT: | ||
Base Score: 9.8 | ||
Severity: CRITICAL | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | ||
|
||
DESC: JPEG XL (aka jpeg-xl) through 0.3.2 allows writable memory corruption. | ||
--- | ||
|
||
ID: CVE-2021-36691 | ||
DATE: 2021-08-30T20:15Z | ||
IMPACT: | ||
Base Score: 7.5 | ||
Severity: HIGH | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | ||
|
||
DESC: libjxl v0.5.0 is affected by a Assertion failed issue in lib/jxl/image.cc jxl::PlaneBase::PlaneBase(). When encoding a malicous GIF file using cjxl, an attacker can trigger a denial of service. | ||
--- | ||
|
||
ID: CVE-2021-36692 | ||
DATE: 2021-08-30T21:15Z | ||
IMPACT: | ||
Base Score: 6.5 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | ||
|
||
DESC: libjxl v0.3.7 is affected by a Divide By Zero in issue in lib/extras/codec_apng.cc jxl::DecodeImageAPNG(). When encoding a malicous APNG file using cjxl, an attacker can trigger a denial of service. | ||
--- | ||
|
||
ID: CVE-2021-45928 | ||
DATE: 2022-01-01T01:15Z | ||
IMPACT: | ||
Base Score: 5.5 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | ||
|
||
DESC: libjxl b02d6b9, as used in libvips 8.11 through 8.11.2 and other products, has an out-of-bounds write in jxl::ModularFrameDecoder::DecodeGroup (called from jxl::FrameDecoder::ProcessACGroup and jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections). | ||
|
||
ID: CVE-2021-22563 | ||
DATE: 2021-11-01T13:15Z | ||
IMPACT: | ||
Base Score: 4.4 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L | ||
|
||
DESC: Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector<std::vector<T>> when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/757 | ||
--- | ||
|
||
ID: CVE-2021-22564 | ||
DATE: 2021-11-01T13:15Z | ||
IMPACT: | ||
Base Score: 5.5 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | ||
|
||
DESC: For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775 | ||
--- | ||
|
||
ID: CVE-2021-27804 | ||
DATE: 2021-03-02T01:15Z | ||
IMPACT: | ||
Base Score: 9.8 | ||
Severity: CRITICAL | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | ||
|
||
DESC: JPEG XL (aka jpeg-xl) through 0.3.2 allows writable memory corruption. | ||
--- | ||
|
||
ID: CVE-2021-36691 | ||
DATE: 2021-08-30T20:15Z | ||
IMPACT: | ||
Base Score: 7.5 | ||
Severity: HIGH | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | ||
|
||
DESC: libjxl v0.5.0 is affected by a Assertion failed issue in lib/jxl/image.cc jxl::PlaneBase::PlaneBase(). When encoding a malicous GIF file using cjxl, an attacker can trigger a denial of service. | ||
--- | ||
|
||
ID: CVE-2021-36692 | ||
DATE: 2021-08-30T21:15Z | ||
IMPACT: | ||
Base Score: 6.5 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | ||
|
||
DESC: libjxl v0.3.7 is affected by a Divide By Zero in issue in lib/extras/codec_apng.cc jxl::DecodeImageAPNG(). When encoding a malicous APNG file using cjxl, an attacker can trigger a denial of service. | ||
--- | ||
|
||
ID: CVE-2021-45928 | ||
DATE: 2022-01-01T01:15Z | ||
IMPACT: | ||
Base Score: 5.5 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | ||
|
||
DESC: libjxl b02d6b9, as used in libvips 8.11 through 8.11.2 and other products, has an out-of-bounds write in jxl::ModularFrameDecoder::DecodeGroup (called from jxl::FrameDecoder::ProcessACGroup and jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections). | ||
--- | ||
|
||
ID: CVE-2022-34000 | ||
DATE: 2022-06-19T20:15Z | ||
IMPACT: | ||
Base Score: 6.5 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | ||
|
||
DESC: libjxl 0.6.1 has an assertion failure in LowMemoryRenderPipeline::Init() in render_pipeline/low_memory_render_pipeline.cc. | ||
|
||
ID: CVE-2021-22563 | ||
DATE: 2021-11-01T13:15Z | ||
IMPACT: | ||
Base Score: 4.4 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L | ||
|
||
DESC: Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector<std::vector<T>> when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/757 | ||
--- | ||
|
||
ID: CVE-2021-22564 | ||
DATE: 2021-11-01T13:15Z | ||
IMPACT: | ||
Base Score: 5.5 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | ||
|
||
DESC: For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775 | ||
--- | ||
|
||
ID: CVE-2021-27804 | ||
DATE: 2021-03-02T01:15Z | ||
IMPACT: | ||
Base Score: 9.8 | ||
Severity: CRITICAL | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | ||
|
||
DESC: JPEG XL (aka jpeg-xl) through 0.3.2 allows writable memory corruption. | ||
--- | ||
|
||
ID: CVE-2021-36691 | ||
DATE: 2021-08-30T20:15Z | ||
IMPACT: | ||
Base Score: 7.5 | ||
Severity: HIGH | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | ||
|
||
DESC: libjxl v0.5.0 is affected by a Assertion failed issue in lib/jxl/image.cc jxl::PlaneBase::PlaneBase(). When encoding a malicous GIF file using cjxl, an attacker can trigger a denial of service. | ||
--- | ||
|
||
ID: CVE-2021-36692 | ||
DATE: 2021-08-30T21:15Z | ||
IMPACT: | ||
Base Score: 6.5 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | ||
|
||
DESC: libjxl v0.3.7 is affected by a Divide By Zero in issue in lib/extras/codec_apng.cc jxl::DecodeImageAPNG(). When encoding a malicous APNG file using cjxl, an attacker can trigger a denial of service. | ||
--- | ||
|
||
ID: CVE-2021-45928 | ||
DATE: 2022-01-01T01:15Z | ||
IMPACT: | ||
Base Score: 5.5 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | ||
|
||
DESC: libjxl b02d6b9, as used in libvips 8.11 through 8.11.2 and other products, has an out-of-bounds write in jxl::ModularFrameDecoder::DecodeGroup (called from jxl::FrameDecoder::ProcessACGroup and jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections). | ||
--- | ||
|
||
ID: CVE-2022-34000 | ||
DATE: 2022-06-19T20:15Z | ||
IMPACT: | ||
Base Score: 6.5 | ||
Severity: MEDIUM | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | ||
|
||
DESC: libjxl 0.6.1 has an assertion failure in LowMemoryRenderPipeline::Init() in render_pipeline/low_memory_render_pipeline.cc. | ||
--- | ||
|
||
ID: CVE-2023-0645 | ||
DATE: 2023-04-11T14:15Z | ||
IMPACT: | ||
Base Score: 9.1 | ||
Severity: CRITICAL | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H | ||
|
||
DESC: An out of bounds read exists in libjxl. An attacker using a specifically crafted file could cause an out of bounds read in the exif handler. We recommend upgrading to version 0.8.1 or past commit https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159 https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159 | ||
--- | ||
|
||
ID: CVE-2023-35790 | ||
DATE: 2023-06-16T21:15Z | ||
IMPACT: | ||
Base Score: 7.5 | ||
Severity: HIGH | ||
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | ||
|
||
DESC: An issue was discovered in dec_patch_dictionary.cc in libjxl before 0.8.2. An integer underflow in patch decoding can lead to a denial of service, such as an infinite loop. |