CVE-2022-32978

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-32978
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-32978.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-32978
Downstream
Published
2022-06-10T15:15:08Z
Modified
2025-08-09T20:01:26Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan.

References

Affected packages

Git / github.com/thorfdbg/libjpeg

Affected ranges

Type
GIT
Repo
https://github.com/thorfdbg/libjpeg
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

{
    "vanir_signatures": [
        {
            "id": "CVE-2022-32978-55200ea4",
            "digest": {
                "length": 2810.0,
                "function_hash": "163515957555476654476716648341094672251"
            },
            "signature_type": "Function",
            "deprecated": false,
            "target": {
                "file": "codestream/sampleinterleavedlsscan.cpp",
                "function": "SampleInterleavedLSScan::ParseMCU"
            },
            "signature_version": "v1",
            "source": "https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7"
        },
        {
            "id": "CVE-2022-32978-5689dc72",
            "digest": {
                "length": 2328.0,
                "function_hash": "311285046678055315024752986528906340906"
            },
            "signature_type": "Function",
            "deprecated": false,
            "target": {
                "file": "codestream/singlecomponentlsscan.cpp",
                "function": "SingleComponentLSScan::ParseMCU"
            },
            "signature_version": "v1",
            "source": "https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7"
        },
        {
            "id": "CVE-2022-32978-8798bcde",
            "digest": {
                "line_hashes": [
                    "280594311517971789971203805469285792835",
                    "152281044020064936939215788550432439759",
                    "262519431338909069941027999591901449611",
                    "197514939160667512479996465199404682623",
                    "198321237115231452784671131740169231885",
                    "317299035883896088909785713870291028212",
                    "321259370930290079189657963577302053983",
                    "122386116870419651546625519921519775685"
                ],
                "threshold": 0.9
            },
            "signature_type": "Line",
            "deprecated": false,
            "target": {
                "file": "codestream/sampleinterleavedlsscan.cpp"
            },
            "signature_version": "v1",
            "source": "https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7"
        },
        {
            "id": "CVE-2022-32978-b7b8509b",
            "digest": {
                "line_hashes": [
                    "279784259655055939818511820799877684835",
                    "198321237115231452784671131740169231885",
                    "133851965833139932519803887623922890079",
                    "64937156121700232804210135073088639598",
                    "236524264625233893874486566012351735951"
                ],
                "threshold": 0.9
            },
            "signature_type": "Line",
            "deprecated": false,
            "target": {
                "file": "codestream/singlecomponentlsscan.cpp"
            },
            "signature_version": "v1",
            "source": "https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7"
        }
    ]
}