A heap-use-after-free flaw was found in ImageSharp's InitializeImage() function of PngDecoderCore.cs file. This vulnerability is triggered when an attacker passes a specially crafted PNG image file to ImageSharp for conversion, potentially leading to information disclosure.
Patches
The problem has been patched. All users are advised to upgrade to v3.1.3 or v2.1.7.
A vulnerability discovered in the ImageSharp library, where the processing of specially crafted files can lead to excessive memory usage in image decoders. The vulnerability is triggered when ImageSharp attempts to process image files that are designed to exploit this flaw.
This flaw can be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on ImageSharp for image processing tasks. Users and administrators are advised to update to the latest version of ImageSharp that addresses this vulnerability to mitigate the risk of exploitation.
Patches
The problem has been patched. All users are advised to upgrade to v3.1.4 or v2.1.8.
Workarounds
Before calling Image.Decode(Async), use Image.Identify to determine the image dimensions in order to enforce a limit.
A data leakage flaw was found in ImageSharp's JPEG and TGA decoders. This vulnerability is triggered when an attacker passes a specially crafted JPEG or TGA image file to a software using ImageSharp, potentially disclosing sensitive information from other parts of the software in the resulting image buffer.
Patches
The problem has been patched. All users are advised to upgrade to v3.1.4 or v2.1.8.
An Out-of-bounds Write vulnerability has been found in the ImageSharp gif decoder, allowing attackers to cause a crash using a specially crafted gif. This can potentially lead to denial of service.
Patches
The problem has been patched. All users are advised to upgrade to v3.1.5 or v2.1.9.
What kind of vulnerability is it? Who is impacted?
A vulnerability discovered in the ImageSharp library, where the processing of specially crafted files can lead to excessive memory usage in the Gif decoder. The vulnerability is triggered when ImageSharp attempts to process image files that are designed to exploit this flaw.
Patches
Has the problem been patched? What versions should users upgrade to?
The problem has been patched. All users are advised to upgrade to v3.1.5 or v2.1.9.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
Before calling Image.Decode(Async), use Image.Identify to determine the image dimensions in order to enforce a limit.
References
Are there any links users can visit to find out more?
SixLabors/ImageSharp (SixLabors.ImageSharp)
### [`v3.1.5`](https://togithub.com/SixLabors/ImageSharp/releases/tag/v3.1.5)
#### What's Changed
- \[3.1] Fix overflow in MemoryAllocator.Create(options) by [@antonfirsov](https://togithub.com/antonfirsov) in [https://github.com/SixLabors/ImageSharp/pull/2731](https://togithub.com/SixLabors/ImageSharp/pull/2731)
- v3 - Backport. Handle out of bounds Gif LZW max code by [@JimBobSquarePants](https://togithub.com/JimBobSquarePants) in [https://github.com/SixLabors/ImageSharp/pull/2754](https://togithub.com/SixLabors/ImageSharp/pull/2754)
- Fix off-by-one error when centering a transform. by [@JimBobSquarePants](https://togithub.com/JimBobSquarePants) in [https://github.com/SixLabors/ImageSharp/pull/2760](https://togithub.com/SixLabors/ImageSharp/pull/2760)
- v3.1.x Fix 2758 by [@JimBobSquarePants](https://togithub.com/JimBobSquarePants) in [https://github.com/SixLabors/ImageSharp/pull/2759](https://togithub.com/SixLabors/ImageSharp/pull/2759)
- v3.1.x - Backport Webp: Fix Issue 2763/2692 by [@JimBobSquarePants](https://togithub.com/JimBobSquarePants) in [https://github.com/SixLabors/ImageSharp/pull/2768](https://togithub.com/SixLabors/ImageSharp/pull/2768)
- Correctly break during Png decoding by [@JimBobSquarePants](https://togithub.com/JimBobSquarePants) in [https://github.com/SixLabors/ImageSharp/pull/2769](https://togithub.com/SixLabors/ImageSharp/pull/2769)
- Fix filtering on PNG encode. by [@JimBobSquarePants](https://togithub.com/JimBobSquarePants) in [https://github.com/SixLabors/ImageSharp/pull/2775](https://togithub.com/SixLabors/ImageSharp/pull/2775)
**Full Changelog**: https://github.com/SixLabors/ImageSharp/compare/v3.1.4...v3.1.5
Configuration
📅 Schedule: Branch creation - "" in timezone America/Chicago, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
â™» Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
[ ] If you want to rebase/retry this PR, check this box
This PR contains the following updates:
3.1.4
->3.1.5
GitHub Vulnerability Alerts
CVE-2024-27929
Impact
A heap-use-after-free flaw was found in ImageSharp's InitializeImage() function of PngDecoderCore.cs file. This vulnerability is triggered when an attacker passes a specially crafted PNG image file to ImageSharp for conversion, potentially leading to information disclosure.
Patches
The problem has been patched. All users are advised to upgrade to v3.1.3 or v2.1.7.
Workarounds
None
References
None
CVE-2024-32035
Impact
A vulnerability discovered in the ImageSharp library, where the processing of specially crafted files can lead to excessive memory usage in image decoders. The vulnerability is triggered when ImageSharp attempts to process image files that are designed to exploit this flaw.
This flaw can be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on ImageSharp for image processing tasks. Users and administrators are advised to update to the latest version of ImageSharp that addresses this vulnerability to mitigate the risk of exploitation.
Patches
The problem has been patched. All users are advised to upgrade to v3.1.4 or v2.1.8.
Workarounds
Before calling
Image.Decode(Async)
, useImage.Identify
to determine the image dimensions in order to enforce a limit.References
CVE-2024-32036
Impact
A data leakage flaw was found in ImageSharp's JPEG and TGA decoders. This vulnerability is triggered when an attacker passes a specially crafted JPEG or TGA image file to a software using ImageSharp, potentially disclosing sensitive information from other parts of the software in the resulting image buffer.
Patches
The problem has been patched. All users are advised to upgrade to v3.1.4 or v2.1.8.
Workarounds
None
References
None
CVE-2024-41131
Impact
An Out-of-bounds Write vulnerability has been found in the ImageSharp gif decoder, allowing attackers to cause a crash using a specially crafted gif. This can potentially lead to denial of service.
Patches
The problem has been patched. All users are advised to upgrade to v3.1.5 or v2.1.9.
Workarounds
None.
References
https://github.com/SixLabors/ImageSharp/pull/2754 https://github.com/SixLabors/ImageSharp/pull/2756
CVE-2024-41132
Impact
What kind of vulnerability is it? Who is impacted?
A vulnerability discovered in the ImageSharp library, where the processing of specially crafted files can lead to excessive memory usage in the Gif decoder. The vulnerability is triggered when ImageSharp attempts to process image files that are designed to exploit this flaw.
Patches
Has the problem been patched? What versions should users upgrade to?
The problem has been patched. All users are advised to upgrade to v3.1.5 or v2.1.9.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
Before calling
Image.Decode(Async)
, useImage.Identify
to determine the image dimensions in order to enforce a limit.References
Are there any links users can visit to find out more?
Release Notes
SixLabors/ImageSharp (SixLabors.ImageSharp)
### [`v3.1.5`](https://togithub.com/SixLabors/ImageSharp/releases/tag/v3.1.5) #### What's Changed - \[3.1] Fix overflow in MemoryAllocator.Create(options) by [@antonfirsov](https://togithub.com/antonfirsov) in [https://github.com/SixLabors/ImageSharp/pull/2731](https://togithub.com/SixLabors/ImageSharp/pull/2731) - v3 - Backport. Handle out of bounds Gif LZW max code by [@JimBobSquarePants](https://togithub.com/JimBobSquarePants) in [https://github.com/SixLabors/ImageSharp/pull/2754](https://togithub.com/SixLabors/ImageSharp/pull/2754) - Fix off-by-one error when centering a transform. by [@JimBobSquarePants](https://togithub.com/JimBobSquarePants) in [https://github.com/SixLabors/ImageSharp/pull/2760](https://togithub.com/SixLabors/ImageSharp/pull/2760) - v3.1.x Fix 2758 by [@JimBobSquarePants](https://togithub.com/JimBobSquarePants) in [https://github.com/SixLabors/ImageSharp/pull/2759](https://togithub.com/SixLabors/ImageSharp/pull/2759) - v3.1.x - Backport Webp: Fix Issue 2763/2692 by [@JimBobSquarePants](https://togithub.com/JimBobSquarePants) in [https://github.com/SixLabors/ImageSharp/pull/2768](https://togithub.com/SixLabors/ImageSharp/pull/2768) - Correctly break during Png decoding by [@JimBobSquarePants](https://togithub.com/JimBobSquarePants) in [https://github.com/SixLabors/ImageSharp/pull/2769](https://togithub.com/SixLabors/ImageSharp/pull/2769) - Fix filtering on PNG encode. by [@JimBobSquarePants](https://togithub.com/JimBobSquarePants) in [https://github.com/SixLabors/ImageSharp/pull/2775](https://togithub.com/SixLabors/ImageSharp/pull/2775) **Full Changelog**: https://github.com/SixLabors/ImageSharp/compare/v3.1.4...v3.1.5Configuration
📅 Schedule: Branch creation - "" in timezone America/Chicago, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
â™» Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.