Vulnerability Details : CVE-2021-22564
For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775
Vulnerability category: OverflowMemory Corruption
Products affected by CVE-2021-22564
- cpe:2.3:a:libjxl_project:libjxl:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-22564
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-22564
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |
3.9
|
2.9
|
NIST | |
4.5
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L |
1.0
|
3.4
|
Google Inc. | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2021-22564
-
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().Assigned by: cve-coordination@google.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-22564
-
https://github.com/libjxl/libjxl/issues/708
Crash during multiple concurrent/parallel decoding · Issue #708 · libjxl/libjxl · GitHubExploit;Issue Tracking;Third Party Advisory
-
https://github.com/libjxl/libjxl/pull/775
Fix out of bounds copy in LoadBorders() by deymo · Pull Request #775 · libjxl/libjxl · GitHubPatch;Third Party Advisory
Jump to