First published: Sat Jun 18 2022(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libjpeg-turbo Libjpeg-turbo | >1.5.3<=2.0.90 | |
debian/libjpeg-turbo | <=1:2.0.6-4 | 1:2.1.5-2 1:2.1.5-3 |
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-46822 is medium with a CVSS score of 5.5.
The libjpeg-turbo package on Debian, Ubuntu, and the Libjpeg-turbo library are affected.
CVE-2021-46822 can cause a heap-based buffer overflow in the PPM reader of libjpeg-turbo, potentially leading to unauthorized access or code execution.
Yes, updates have been released to address the vulnerability. Please refer to the respective vendor's advisories for the updated versions.
More information about CVE-2021-46822 can be found on the IBM X-Force Exchange, libjpeg-turbo GitHub repository, and the Launchpad bug report.