CVE-2022-1325

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-1325
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-1325.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-1325
Related
Published
2022-08-31T16:15:09Z
Modified
2025-01-15T02:13:46.796631Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in Clmg, where with the help of a maliciously crafted pandore or bmp file with modified dx and dy header field values it is possible to trick the application into allocating huge buffer sizes like 64 Gigabyte upon reading the file from disk or from a virtual buffer.

References

Affected packages

Debian:11 / cimg

Package

Name
cimg
Purl
pkg:deb/debian/cimg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.9.4+dfsg-2
2.9.4+dfsg-3

3.*

3.0.2+dfsg-1
3.1.6+dfsg-1
3.1.6+dfsg-2
3.1.6+dfsg-3
3.1.6+dfsg-4
3.1.6+dfsg-5
3.1.6+dfsg-6
3.2.0+dfsg-1
3.2.1+dfsg-1
3.2.1+dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / cimg

Package

Name
cimg
Purl
pkg:deb/debian/cimg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.6+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / cimg

Package

Name
cimg
Purl
pkg:deb/debian/cimg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.6+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/dtschump/cimg

Affected ranges

Type
GIT
Repo
https://github.com/dtschump/cimg
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/greyclab/cimg
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v.*

v.2.3.0
v.2.3.1
v.2.3.2
v.2.3.3
v.2.3.4
v.2.3.5
v.2.3.6
v.2.4.0
v.2.4.1
v.2.4.2
v.2.4.3
v.2.4.4
v.2.4.5
v.2.5.0
v.2.5.1
v.2.5.2
v.2.5.3
v.2.5.4
v.2.5.5
v.2.5.6
v.2.5.7
v.2.6.0
v.2.6.1
v.2.6.2
v.2.6.3
v.2.6.4
v.2.6.5
v.2.6.6
v.2.6.7
v.2.7.0
v.2.7.1
v.2.7.2
v.2.7.3
v.2.7.4
v.2.7.5
v.2.8.0
v.2.8.1
v.2.8.2
v.2.8.3
v.2.8.4
v.2.9.0
v.2.9.1
v.2.9.2
v.2.9.3
v.2.9.4
v.2.9.5
v.2.9.6
v.2.9.7
v.2.9.8
v.2.9.9
v.3.0.0
v.3.0.1
v.3.0.2