Security Vulnerability - Action Required: heap-based buffer overflow vulnerability may in your project #103
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Hi,
we have detected that your project may be vulnerable to heap-based buffer overflow in the function of
simple_upscale
in the file ofsrc/3rdparty/libjpeg/src/jdlossls.c
. It shares similarities to a recent CVE disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-2804 in the https://github.com/libjpeg-turbo/libjpeg-turbo.The source vulnerability information is as follows:
Would you help to check if this bug is true? If it's true, please review this pr. Thank you for your effort and patience!