The package jpeg-js before 0.4.4 are vulnerable to Denial of Service (DoS) where a particular piece of input will cause to enter an infinite loop and never return.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-JPEGJS-2859218 | third party advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2860295 | third party advisory |
https://github.com/jpeg-js/jpeg-js/issues/105 | third party advisory issue tracking exploit |
https://github.com/jpeg-js/jpeg-js/pull/106/ | third party advisory patch |
https://github.com/jpeg-js/jpeg-js/commit/9ccd35fb5f55a6c4f1902ac5b0f270f675750c27 | third party advisory patch |