JLSEC-2025-178

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-178.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-178.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-178
Upstream
Published
2025-10-21T17:39:06.495Z
Modified
2025-11-03T00:18:32.830841Z
Summary
The tjLoadImage function in libjpeg-turbo 2.0.1 has an integer overflow with a resultant heap-based ...
Details

The tjLoadImage function in libjpeg-turbo 2.0.1 has an integer overflow with a resultant heap-based buffer overflow via a BMP image because multiplication of pitch and height is mishandled, as demonstrated by tjbench.

Database specific
{
    "sources": [
        {
            "imported": "2025-10-21T15:03:32.793Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2018-20330",
            "modified": "2024-11-21T04:01:14.810Z",
            "id": "CVE-2018-20330",
            "published": "2018-12-21T09:29:00.247Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20330"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / JpegTurbo_jll

Package

Name
JpegTurbo_jll
Purl
pkg:julia/JpegTurbo_jll?uuid=aacddb02-875f-59d6-b918-886e6ef4fbf8

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0+0