Summary: | media-libs/libsixel: multiple vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | filip ambroz <filip.ambroz> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | CONFIRMED --- | ||
Severity: | minor | CC: | ajak, hattya |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://github.com/libsixel/libsixel/issues/51 | ||
Whiteboard: | B3 [upstream] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 836241 |
Description
filip ambroz
2022-01-25 15:03:13 UTC
"so this wasn't even supposed to be using STB, except for a bug where the compilie-time config wasn't being checked correctly. it now ought use libpng when present, and i'm thinking we ought yank out this vendored library." Heh. libsixel has a stable version so switching to B, and marking as [upstream/ebuild] since there are patches available if the maintainer deems it necessary to import them. [CVE-2021-46700] In libsixel 1.8.6, sixel_encoder_output_without_macro (called from sixel_encoder_encode_frame in encoder.c) has a double free. URL: https://github.com/saitoha/libsixel/issues/158 CVE-2021-46700 (https://github.com/saitoha/libsixel/issues/158): In libsixel 1.8.6, sixel_encoder_output_without_macro (called from sixel_encoder_encode_frame in encoder.c) has a double free. CVE-2020-36123 (https://github.com/saitoha/libsixel/issues/144): saitoha libsixel v1.8.6 was discovered to contain a double free via the component sixel_chunk_destroy at /root/libsixel/src/chunk.c. CVE-2021-40656 (https://github.com/libsixel/libsixel/issues/25): libsixel before 1.10 is vulnerable to Buffer Overflow in libsixel/src/quant.c:867. CVE-2021-41715 (https://github.com/libsixel/libsixel/issues/27): libsixel 1.10.0 is vulnerable to Use after free in libsixel/src/dither.c:379. CVE-2022-27044 (https://github.com/saitoha/libsixel/issues/156): libsixel 1.8.6 is affected by Buffer Overflow in libsixel/src/quant.c:876. CVE-2022-27046 (https://github.com/saitoha/libsixel/issues/157): libsixel 1.8.6 suffers from a Heap Use After Free vulnerability in in libsixel/src/dither.c:388. The libsixel/libsixel issue is fixed. The saitoha repository remains unresponsive. More investigation is needed to determine if the saitoha vulnerabilities affect the libsixel/libsixel repository. CVE-2022-29977 (https://github.com/saitoha/libsixel/issues/165): There is an assertion failure error in stbi__jpeg_huff_decode, stb_image.h:1894 in libsixel img2sixel 1.8.6. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted JPEG file. CVE-2022-29978 (https://github.com/saitoha/libsixel/issues/166): There is a floating point exception error in sixel_encoder_do_resize, encoder.c:633 in libsixel img2sixel 1.8.6. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted JPEG file. (In reply to John Helmert III from comment #7) > CVE-2022-29977 (https://github.com/saitoha/libsixel/issues/165): > > There is an assertion failure error in stbi__jpeg_huff_decode, > stb_image.h:1894 in libsixel img2sixel 1.8.6. Remote attackers could > leverage this vulnerability to cause a denial-of-service via a crafted JPEG > file. > > CVE-2022-29978 (https://github.com/saitoha/libsixel/issues/166): > > There is a floating point exception error in sixel_encoder_do_resize, > encoder.c:633 in libsixel img2sixel 1.8.6. Remote attackers could leverage > this vulnerability to cause a denial-of-service via a crafted JPEG file. Doesn't look like these two are fixed. |