Action not permitted
Modal body text goes here.
ghsa-7vr8-hqr3-rjrw
Vulnerability from github
Published
2022-05-14 03:59
Modified
2022-05-14 03:59
Details
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
{ "affected": [], "aliases": [ "CVE-2013-6629" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-11-19T04:50:00Z", "severity": "MODERATE" }, "details": "The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.", "id": "GHSA-7vr8-hqr3-rjrw", "modified": "2022-05-14T03:59:59Z", "published": "2022-05-14T03:59:59Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6629" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2014:0413" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2014:0414" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=891693" }, { "type": "WEB", "url": "https://code.google.com/p/chromium/issues/detail?id=258723" }, { "type": "WEB", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201606-03" }, { "type": "WEB", "url": "https://src.chromium.org/viewvc/chrome?revision=229729\u0026view=revision" }, { "type": "WEB", "url": "https://www.ibm.com/support/docview.wss?uid=swg21675973" }, { "type": "WEB", "url": "http://advisories.mageia.org/MGASA-2013-0333.html" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0080.html" }, { "type": "WEB", "url": "http://bugs.ghostscript.com/show_bug.cgi?id=686980" }, { "type": "WEB", "url": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140852886808946\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=140852974709252\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1803.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1804.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/56175" }, { "type": "WEB", "url": "http://secunia.com/advisories/58974" }, { "type": "WEB", "url": "http://secunia.com/advisories/59058" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT6150" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT6162" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT6163" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21672080" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676746" }, { "type": "WEB", "url": "http://www.debian.org/security/2013/dsa-2799" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:273" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-116.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/63676" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1029470" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1029476" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2052-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2053-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2060-1" } ], "schema_version": "1.4.0", "severity": [] }
cve-2013-6629
Vulnerability from cvelistv5
Published
2013-11-15 20:00
Modified
2024-08-06 17:46
Severity
Summary
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:46:22.170Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20131112 bugs in IJG jpeg6b \u0026 libjpeg-turbo", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0080.html" }, { "name": "63676", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/63676" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/docview.wss?uid=swg21675973" }, { "name": "RHSA-2014:0414", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2014:0414" }, { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "RHSA-2013:1804", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1804.html" }, { "name": "openSUSE-SU-2013:1958", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" }, { "name": "HPSBUX03091", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852886808946\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21672080" }, { "name": "RHSA-2014:0413", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2014:0413" }, { "name": "59058", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59058" }, { "name": "SSRT101667", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852886808946\u0026w=2" }, { "name": "RHSA-2013:1803", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1803.html" }, { "name": "openSUSE-SU-2013:1957", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" }, { "name": "HPSBUX03092", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852974709252\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT6163" }, { "name": "56175", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56175" }, { "name": "FEDORA-2013-23127", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html" }, { "name": "openSUSE-SU-2014:0065", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "name": "FEDORA-2013-23519", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html" }, { "name": "58974", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58974" }, { "name": "1029470", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029470" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=891693" }, { "name": "openSUSE-SU-2013:1917", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-116.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT6150" }, { "name": "openSUSE-SU-2013:1959", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html" }, { "name": "openSUSE-SU-2013:1916", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" }, { "name": "openSUSE-SU-2014:0008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html" }, { "name": "1029476", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029476" }, { "name": "openSUSE-SU-2013:1776", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html" }, { "name": "SSRT101668", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852974709252\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://src.chromium.org/viewvc/chrome?revision=229729\u0026view=revision" }, { "name": "GLSA-201606-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201606-03" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676746" }, { "name": "openSUSE-SU-2013:1918", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" }, { "name": "FEDORA-2013-23291", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT6162" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=258723" }, { "name": "USN-2052-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2052-1" }, { "name": "DSA-2799", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2799" }, { "name": "openSUSE-SU-2013:1861", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html" }, { "name": "openSUSE-SU-2013:1777", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2013-0333.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.ghostscript.com/show_bug.cgi?id=686980" }, { "name": "MDVSA-2013:273", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:273" }, { "name": "USN-2060-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2060-1" }, { "name": "USN-2053-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2053-1" }, { "name": "FEDORA-2013-23295", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20131112 bugs in IJG jpeg6b \u0026 libjpeg-turbo", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0080.html" }, { "name": "63676", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/63676" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/docview.wss?uid=swg21675973" }, { "name": "RHSA-2014:0414", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2014:0414" }, { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "RHSA-2013:1804", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1804.html" }, { "name": "openSUSE-SU-2013:1958", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" }, { "name": "HPSBUX03091", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852886808946\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21672080" }, { "name": "RHSA-2014:0413", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2014:0413" }, { "name": "59058", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59058" }, { "name": "SSRT101667", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852886808946\u0026w=2" }, { "name": "RHSA-2013:1803", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1803.html" }, { "name": "openSUSE-SU-2013:1957", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" }, { "name": "HPSBUX03092", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852974709252\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT6163" }, { "name": "56175", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56175" }, { "name": "FEDORA-2013-23127", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html" }, { "name": "openSUSE-SU-2014:0065", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "name": "FEDORA-2013-23519", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html" }, { "name": "58974", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58974" }, { "name": "1029470", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029470" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=891693" }, { "name": "openSUSE-SU-2013:1917", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-116.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT6150" }, { "name": "openSUSE-SU-2013:1959", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html" }, { "name": "openSUSE-SU-2013:1916", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" }, { "name": "openSUSE-SU-2014:0008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html" }, { "name": "1029476", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029476" }, { "name": "openSUSE-SU-2013:1776", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html" }, { "name": "SSRT101668", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140852974709252\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://src.chromium.org/viewvc/chrome?revision=229729\u0026view=revision" }, { "name": "GLSA-201606-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201606-03" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676746" }, { "name": "openSUSE-SU-2013:1918", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" }, { "name": "FEDORA-2013-23291", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT6162" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=258723" }, { "name": "USN-2052-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2052-1" }, { "name": "DSA-2799", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2799" }, { "name": "openSUSE-SU-2013:1861", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html" }, { "name": "openSUSE-SU-2013:1777", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2013-0333.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.ghostscript.com/show_bug.cgi?id=686980" }, { "name": "MDVSA-2013:273", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:273" }, { "name": "USN-2060-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2060-1" }, { "name": "USN-2053-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2053-1" }, { "name": "FEDORA-2013-23295", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-6629", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20131112 bugs in IJG jpeg6b \u0026 libjpeg-turbo", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0080.html" }, { "name": "63676", "refsource": "BID", "url": "http://www.securityfocus.com/bid/63676" }, { "name": "https://www.ibm.com/support/docview.wss?uid=swg21675973", "refsource": "CONFIRM", "url": "https://www.ibm.com/support/docview.wss?uid=swg21675973" }, { "name": "RHSA-2014:0414", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2014:0414" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "RHSA-2013:1804", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1804.html" }, { "name": "openSUSE-SU-2013:1958", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" }, { "name": "HPSBUX03091", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140852886808946\u0026w=2" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21672080", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21672080" }, { "name": "RHSA-2014:0413", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2014:0413" }, { "name": "59058", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59058" }, { "name": "SSRT101667", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140852886808946\u0026w=2" }, { "name": "RHSA-2013:1803", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1803.html" }, { "name": "openSUSE-SU-2013:1957", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" }, { "name": "HPSBUX03092", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140852974709252\u0026w=2" }, { "name": "http://support.apple.com/kb/HT6163", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6163" }, { "name": "56175", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56175" }, { "name": "FEDORA-2013-23127", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html" }, { "name": "openSUSE-SU-2014:0065", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" }, { "name": "FEDORA-2013-23519", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html" }, { "name": "58974", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58974" }, { "name": "1029470", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029470" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=891693", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=891693" }, { "name": "openSUSE-SU-2013:1917", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" }, { "name": "http://www.mozilla.org/security/announce/2013/mfsa2013-116.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-116.html" }, { "name": "http://support.apple.com/kb/HT6150", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6150" }, { "name": "openSUSE-SU-2013:1959", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html" }, { "name": "openSUSE-SU-2013:1916", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" }, { "name": "openSUSE-SU-2014:0008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" }, { "name": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html" }, { "name": "1029476", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029476" }, { "name": "openSUSE-SU-2013:1776", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html" }, { "name": "SSRT101668", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=140852974709252\u0026w=2" }, { "name": "https://src.chromium.org/viewvc/chrome?revision=229729\u0026view=revision", "refsource": "CONFIRM", "url": "https://src.chromium.org/viewvc/chrome?revision=229729\u0026view=revision" }, { "name": "GLSA-201606-03", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201606-03" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676746", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676746" }, { "name": "openSUSE-SU-2013:1918", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" }, { "name": "FEDORA-2013-23291", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html" }, { "name": "http://support.apple.com/kb/HT6162", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6162" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=258723", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=258723" }, { "name": "USN-2052-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2052-1" }, { "name": "DSA-2799", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2799" }, { "name": "openSUSE-SU-2013:1861", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html" }, { "name": "openSUSE-SU-2013:1777", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "http://advisories.mageia.org/MGASA-2013-0333.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2013-0333.html" }, { "name": "http://bugs.ghostscript.com/show_bug.cgi?id=686980", "refsource": "CONFIRM", "url": "http://bugs.ghostscript.com/show_bug.cgi?id=686980" }, { "name": "MDVSA-2013:273", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:273" }, { "name": "USN-2060-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2060-1" }, { "name": "USN-2053-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2053-1" }, { "name": "FEDORA-2013-23295", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-6629", "datePublished": "2013-11-15T20:00:00", "dateReserved": "2013-11-05T00:00:00", "dateUpdated": "2024-08-06T17:46:22.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading...