Lookup for vulnerable packages by Package URL.
| Purl | pkg:apk/alpine/libjpeg-turbo@2.1.5.1-r4?arch=x86_64&distroversion=v3.22&reponame=main |
| Type | apk |
| Namespace | alpine |
| Name | libjpeg-turbo |
| Version | 2.1.5.1-r4 |
| Qualifiers |
| arch |
x86_64 |
| distroversion |
v3.22 |
| reponame |
main |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-b91f-d2h1-8ya5 |
| vulnerability_id |
VCID-b91f-d2h1-8ya5 |
| summary |
Out-of-bounds Write
A heap-based buffer overflow issue was discovered in libjpeg-turbo in h2v2_merged_upsample_internal() function of jdmrgext.c file. The vulnerability can only be exploited with 12-bit data precision for which the range of the sample data type exceeds the valid sample range, hence, an attacker could craft a 12-bit lossless JPEG image that contains out-of-range 12-bit samples. An application attempting to decompress such image using merged upsampling would lead to segmentation fault or buffer overflows, causing an application to crash. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2804 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23653 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.2384 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23618 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23687 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23733 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23706 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.2365 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23662 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24269 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2804 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-2804
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b91f-d2h1-8ya5 |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:apk/alpine/libjpeg-turbo@2.1.5.1-r4%3Farch=x86_64&distroversion=v3.22&reponame=main |