All the vulnerabilites related to Google LLC - libjxl
cve-2021-22564
Vulnerability from cvelistv5
Published
2021-11-01 13:10
Modified
2024-09-17 00:21
Severity ?
EPSS score ?
Summary
For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775
References
▼ | URL | Tags |
---|---|---|
https://github.com/libjxl/libjxl/pull/775 | x_refsource_MISC | |
https://github.com/libjxl/libjxl/issues/708 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Google LLC | libjxl |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.117Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/libjxl/libjxl/pull/775" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/libjxl/libjxl/issues/708" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libjxl", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-01T13:10:15", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/libjxl/libjxl/pull/775" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/libjxl/libjxl/issues/708" } ], "source": { "discovery": "UNKNOWN" }, "title": "Out of bounds Copy in Libjxl in large image groups", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "DATE_PUBLIC": "2021-10-14T20:00:00.000Z", "ID": "CVE-2021-22564", "STATE": "PUBLIC", "TITLE": "Out of bounds Copy in Libjxl in large image groups" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libjxl", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/libjxl/libjxl/pull/775", "refsource": "MISC", "url": "https://github.com/libjxl/libjxl/pull/775" }, { "name": "https://github.com/libjxl/libjxl/issues/708", "refsource": "MISC", "url": "https://github.com/libjxl/libjxl/issues/708" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2021-22564", "datePublished": "2021-11-01T13:10:15.502811Z", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-09-17T00:21:49.352Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22563
Vulnerability from cvelistv5
Published
2021-11-01 13:10
Modified
2024-09-17 02:10
Severity ?
EPSS score ?
Summary
Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector<std::vector<T>> when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/757
References
▼ | URL | Tags |
---|---|---|
https://github.com/libjxl/libjxl/issues/735 | x_refsource_MISC | |
https://github.com/libjxl/libjxl/pull/757 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Google LLC | libjxl |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/libjxl/libjxl/issues/735" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/libjxl/libjxl/pull/757" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libjxl", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector\u003cstd::vector\u003cT\u003e\u003e when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/757" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-126", "description": "CWE-126 Buffer Over-read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-01T13:10:13", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/libjxl/libjxl/issues/735" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/libjxl/libjxl/pull/757" } ], "source": { "discovery": "UNKNOWN" }, "title": "Memory Overread in libjxl", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "DATE_PUBLIC": "2021-10-14T20:00:00.000Z", "ID": "CVE-2021-22563", "STATE": "PUBLIC", "TITLE": "Memory Overread in libjxl" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libjxl", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector\u003cstd::vector\u003cT\u003e\u003e when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/757" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-126 Buffer Over-read" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/libjxl/libjxl/issues/735", "refsource": "MISC", "url": "https://github.com/libjxl/libjxl/issues/735" }, { "name": "https://github.com/libjxl/libjxl/pull/757", "refsource": "MISC", "url": "https://github.com/libjxl/libjxl/pull/757" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2021-22563", "datePublished": "2021-11-01T13:10:13.942562Z", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-09-17T02:10:45.898Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }