{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-2804", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "n/a", "product": { "product_data": [ { "product_name": "libjpeg-turbo", "version": { "version_data": [ { "version_value": "Fixed in libjpeg-turbo v3.0 (beta2)" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 - Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "refsource": "MISC", "name": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/675", "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/675" }, { "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2208447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2208447" }, { "refsource": "MISC", "name": "https://access.redhat.com/security/cve/CVE-2023-2804", "url": "https://access.redhat.com/security/cve/CVE-2023-2804" }, { "refsource": "MISC", "name": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9f756bc67a84d4566bf74a0c2432aa55da404021", "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9f756bc67a84d4566bf74a0c2432aa55da404021" }, { "refsource": "MISC", "name": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/668#issuecomment-1492586118", "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/668#issuecomment-1492586118" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "A heap-based buffer overflow issue was discovered in libjpeg-turbo in h2v2_merged_upsample_internal() function of jdmrgext.c file. The vulnerability can only be exploited with 12-bit data precision for which the range of the sample data type exceeds the valid sample range, hence, an attacker could craft a 12-bit lossless JPEG image that contains out-of-range 12-bit samples. An application attempting to decompress such image using merged upsampling would lead to segmentation fault or buffer overflows, causing an application to crash." } ] } }