CVE-2023-46362
NixOS vulnerability analysis and mitigation

Overview

jbig2enc v0.28 was discovered to contain a heap-use-after-free vulnerability via jbig2enc_auto_threshold_using_hash in src/jbig2enc.cc. The vulnerability was disclosed on October 16, 2023 and assigned CVE-2023-46362. The affected component is the jbig2enc software, which is an encoder for JBIG2 format used for encoding bi-level (1 bpp) images (GitHub Issue).

Technical details

The vulnerability is a heap-use-after-free issue that occurs in the remove_templates function in src/jbig2enc.cc at line 248. The flaw is triggered when processing certain input through the jbig2enc_auto_threshold_using_hash function. According to the CVSS v3.1 scoring, this vulnerability has been rated as MEDIUM severity with a base score of 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) (NVD).

Impact

The vulnerability can lead to a Denial of Service (DoS) condition when exploited. The heap-use-after-free condition allows reading from already freed memory regions, which can cause the application to crash (GitHub Issue).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20807MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026
CVE-2025-20806MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026
CVE-2025-20805MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026
CVE-2025-20804MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026
CVE-2025-20803MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management