{"id":"JLSEC-2025-178","summary":"The tjLoadImage function in libjpeg-turbo 2.0.1 has an integer overflow with a resultant heap-based ...","details":"The tjLoadImage function in libjpeg-turbo 2.0.1 has an integer overflow with a resultant heap-based buffer overflow via a BMP image because multiplication of pitch and height is mishandled, as demonstrated by tjbench.","modified":"2025-11-03T00:18:32.830841Z","published":"2025-10-21T17:39:06.495Z","upstream":["CVE-2018-20330"],"database_specific":{"sources":[{"url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2018-20330","modified":"2024-11-21T04:01:14.810Z","published":"2018-12-21T09:29:00.247Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20330","imported":"2025-10-21T15:03:32.793Z","id":"CVE-2018-20330"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"https://github.com/libjpeg-turbo/libjpeg-turbo/issues/304"},{"type":"WEB","url":"https://usn.ubuntu.com/4190-1/"}],"affected":[{"package":{"name":"JpegTurbo_jll","ecosystem":"Julia","purl":"pkg:julia/JpegTurbo_jll?uuid=aacddb02-875f-59d6-b918-886e6ef4fbf8"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.1.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-178.json"}}],"schema_version":"1.7.3"}