A heap-based buffer overflow issue was discovered in libjpeg-turbo in h2v2mergedupsample_internal() function of jdmrgext.c file. The vulnerability can only be exploited with 12-bit data precision for which the range of the sample data type exceeds the valid sample range, hence, an attacker could craft a 12-bit lossless JPEG image that contains out-of-range 12-bit samples. An application attempting to decompress such image using merged upsampling would lead to segmentation fault or buffer overflows, causing an application to crash.
[
{
"digest": {
"length": 138.0,
"function_hash": "45893349253428892599678605874317640076"
},
"id": "CVE-2023-2804-2cf6521f",
"source": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9f756bc67a84d4566bf74a0c2432aa55da404021",
"signature_type": "Function",
"target": {
"file": "jdlossls.c",
"function": "noscale"
},
"signature_version": "v1",
"deprecated": false
},
{
"digest": {
"length": 153.0,
"function_hash": "112376369083220100668902696318947702360"
},
"id": "CVE-2023-2804-41bd6fca",
"source": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9f756bc67a84d4566bf74a0c2432aa55da404021",
"signature_type": "Function",
"target": {
"file": "jdlossls.c",
"function": "simple_upscale"
},
"signature_version": "v1",
"deprecated": false
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"264453119585316427186485396598254512130",
"65582456727176366817468335422094827974",
"30055463991005291524467097402588854178",
"310651516989145847112025202950843573985",
"107740660841104471832336593730836883285",
"224351062765144820444831876706738103013",
"320633655483827400771117174154721494510",
"198497929741904313163517209949287782005",
"211719071145529734302749623535903388273",
"8154639209289213855050992008852297386",
"271144142464856104214596135343707024446"
]
},
"id": "CVE-2023-2804-f12af71f",
"source": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9f756bc67a84d4566bf74a0c2432aa55da404021",
"signature_type": "Line",
"target": {
"file": "jdlossls.c"
},
"signature_version": "v1",
"deprecated": false
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2804.json"