CVE-2021-22564

Public Exploit
Out of bounds Copy in Libjxl in large image groups

Description

For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775

Categories

4.5
CVSS
Severity: Medium
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.04%
Third-Party Advisory github.com Third-Party Advisory github.com
Affected: Google LLC libjxl
Published at:
Updated at:

References

Link Tags
https://github.com/libjxl/libjxl/pull/775 third party advisory patch
https://github.com/libjxl/libjxl/issues/708 third party advisory issue tracking exploit

Frequently Asked Questions

What is the severity of CVE-2021-22564?
CVE-2021-22564 has been scored as a medium severity vulnerability.
How to fix CVE-2021-22564?
To fix CVE-2021-22564, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2021-22564 being actively exploited in the wild?
It is possible that CVE-2021-22564 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-22564?
CVE-2021-22564 affects Google LLC libjxl.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.