Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 905094 (CVE-2021-22563, CVE-2021-22564, CVE-2021-36692, CVE-2021-45928, CVE-2023-0645) - media-libs/libjxl: multiple vulnerabilities
Summary: media-libs/libjxl: multiple vulnerabilities
Status: IN_PROGRESS
Alias: CVE-2021-22563, CVE-2021-22564, CVE-2021-36692, CVE-2021-45928, CVE-2023-0645
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B4 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-04-26 03:06 UTC by John Helmert III
Modified: 2024-03-05 19:26 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-04-26 03:06:24 UTC
CVE-2023-0645 (https://github.com/libjxl/libjxl/pull/2101):

An out of bounds read exists in libjxl. An attacker using a specifically crafted file could cause an out of bounds read in the exif handler. We recommend upgrading to version 0.8.1 or past commit  https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159 https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159 

CVE-2021-45928 (https://github.com/libjxl/libjxl/issues/360):

libjxl b02d6b9, as used in libvips 8.11 through 8.11.2 and other products, has an out-of-bounds write in jxl::ModularFrameDecoder::DecodeGroup (called from jxl::FrameDecoder::ProcessACGroup and jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections).

CVE-2021-22563 (https://github.com/libjxl/libjxl/issues/735):

Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector<std::vector<T>> when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/757

CVE-2021-22564 (https://github.com/libjxl/libjxl/issues/708):

For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775

CVE-2021-36692 (https://github.com/libjxl/libjxl/issues/308):

libjxl v0.3.7 is affected by a Divide By Zero in issue in lib/extras/codec_apng.cc jxl::DecodeImageAPNG(). When encoding a malicous APNG file using cjxl, an attacker can trigger a denial of service.

CVE-2021-36691 (https://github.com/libjxl/libjxl/issues/422):

libjxl v0.5.0 is affected by a Assertion failed issue in lib/jxl/image.cc jxl::PlaneBase::PlaneBase(). When encoding a malicous GIF file using cjxl, an attacker can trigger a denial of service.

All are fixed in 0.7.0_pre20220825 except CVE-2023-0645, which only has a patch in master.
Comment 1 Daniel Novomeský 2023-04-26 05:11:33 UTC
Can we make the 0.8.1 version stable?
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-05-01 03:48:20 UTC
(In reply to Daniel Novomeský from comment #1)
> Can we make the 0.8.1 version stable?

Yes, but we still won't get the fix for CVE-2023-0645.

And looking again, it looks like CVE-2021-36691 doesn't actually have a fix.