{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/18804?format=json","vulnerability_id":"VCID-9ewc-ttxk-eufx","summary":"Out-of-bounds Write\nlibjpeg-turbo version 2.0.90 is vulnerable to a heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c.","aliases":[{"alias":"CVE-2021-29390"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/59574?format=json","purl":"pkg:conan/libjpeg-turbo@2.1.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:conan/libjpeg-turbo@2.1.5"},{"url":"http://public2.vulnerablecode.io/api/packages/927721?format=json","purl":"pkg:deb/debian/libjpeg-turbo@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927722?format=json","purl":"pkg:deb/debian/libjpeg-turbo@1:2.0.6-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d73e-m4f8-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.0.6-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927720?format=json","purl":"pkg:deb/debian/libjpeg-turbo@1:2.1.5-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/927723?format=json","purl":"pkg:deb/debian/libjpeg-turbo@1:2.1.5-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libjpeg-turbo@1:2.1.5-4%3Fdistro=trixie"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/59573?format=json","purl":"pkg:conan/libjpeg-turbo@2.0.90","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ewc-ttxk-eufx"},{"vulnerability":"VCID-bz3a-w43e-y7fb"},{"vulnerability":"VCID-d73e-m4f8-73bc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:conan/libjpeg-turbo@2.0.90"},{"url":"http://public2.vulnerablecode.io/api/packages/95612?format=json","purl":"pkg:rpm/redhat/libjpeg-turbo@2.0.90-7?arch=el9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ewc-ttxk-eufx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libjpeg-turbo@2.0.90-7%3Farch=el9"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29390.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29390.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29390","reference_id":"","reference_type":"","scores":[{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20348","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20552","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2028","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20419","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20449","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20404","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29390"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1943797","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:08:32Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1943797"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235521","reference_id":"2235521","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235521"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/","reference_id":"27NR3KG553CG6LGPMP6SHWEVHTYPL6RC","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:08:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/","reference_id":"6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:08:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29390","reference_id":"CVE-2021-29390","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29390"},{"reference_url":"https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c","reference_id":"jdcoefct.c","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:08:32Z/"}],"url":"https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c"},{"reference_url":"https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595","reference_id":"jdcoefct.c#L595","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:08:32Z/"}],"url":"https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/","reference_id":"KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:08:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2295","reference_id":"RHSA-2024:2295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2295"}],"weaknesses":[{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":787,"name":"Out-of-bounds Write","description":"The product writes data past the end, or before the beginning, of the intended buffer."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."},{"cwe_id":125,"name":"Out-of-bounds Read","description":"The product reads data past the end, or before the beginning, of the intended buffer."}],"exploits":[],"severity_range_score":"7.1 - 7.1","exploitability":"0.5","weighted_severity":"6.4","risk_score":3.2,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ewc-ttxk-eufx"}