{"id":"CVE-2021-46822","details":"The PPM reader in libjpeg-turbo through 2.0.90 mishandles use of tjLoadImage for loading a 16-bit binary PPM file into a grayscale buffer and loading a 16-bit binary PGM file into an RGB buffer. This is related to a heap-based buffer overflow in the get_word_rgb_row function in rdppm.c.","modified":"2026-04-16T04:38:32.276670501Z","published":"2022-06-18T16:15:08.110Z","related":["ALSA-2023:1068"],"references":[{"type":"ADVISORY","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/221567"},{"type":"FIX","url":"https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libjpeg-turbo/libjpeg-turbo","events":[{"introduced":"0"},{"last_affected":"4e52b66f342a803d3b8099b79607e3158d3a241c"},{"fixed":"f35fd27ec641c42d6b115bfa595e483ec58188d2"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.0.90"}]}}],"versions":["0.0.90","0.0.91","0.0.93","1.0.0","1.0.1","1.0.90","1.1.90","1.2.90","1.3.90","1.4.90","1.5.0","1.5.90","2.0.0","2.0.90","jpeg-1","jpeg-2","jpeg-3","jpeg-4","jpeg-4a","jpeg-5","jpeg-5a","jpeg-5b","jpeg-6","jpeg-6a","jpeg-6b"],"database_specific":{"vanir_signatures_modified":"2026-04-11T23:37:31Z","vanir_signatures":[{"deprecated":false,"signature_type":"Line","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["154550684937007978792065401036434341956","34849433911376459619790736472170818814","281695252477769122714200495655720896267","120533593229279907622435113682742146338","187701529453313185003093589009297679654","14934939567025485057297003720762987776","301088263237368198422355583340185968111","160364715725206012533217877395764884215","277312511432121514880445334256442317583","215631509190130614950731538068129801662","14934939567025485057297003720762987776","301088263237368198422355583340185968111","160364715725206012533217877395764884215","277312511432121514880445334256442317583","215631509190130614950731538068129801662","14934939567025485057297003720762987776","109725220448925549931635803942821075455","307520553355166449773085376864574377107","250930862893698800802467478106603718999","118080646153056444353964411301831564746","141659211143879742304022490176222501022","198516492182538729912405465337904091103","217106799193293312340383186906426194131","7397032083592044428714565800923071329","151504451180928648502687094723131443583","139317428699747889858124752718420697288","64985835885397232212285452255761324306"]},"source":"https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2","target":{"file":"rdppm.c"},"id":"CVE-2021-46822-692d368f"},{"signature_type":"Function","id":"CVE-2021-46822-6f698acc","signature_version":"v1","digest":{"function_hash":"182312530622160650449074891296046880301","length":932},"deprecated":false,"target":{"function":"get_word_rgb_row","file":"rdppm.c"},"source":"https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2"},{"deprecated":false,"signature_type":"Function","signature_version":"v1","digest":{"function_hash":"236958233622389590308291619840792029626","length":4737},"id":"CVE-2021-46822-cedc80d1","target":{"function":"start_input_ppm","file":"rdppm.c"},"source":"https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-46822.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}