[SECURITY] [DSA 5958-1] jpeg-xl security update

Date: unknown

Location: lists.debian.org


[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5958-1                   security@debian.org
https://www.debian.org/security/                                  Aron Xu
July 04, 2025                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : jpeg-xl
CVE ID         : CVE-2023-0645 CVE-2023-35790 CVE-2024-11403 CVE-2024-11498
Debian Bug     : 1034722 1055306 1088818

Multiple vulnerabilities are discovered in jpeg-xl, the JPEG XL ("JXL")
image coding library, including out of bounds read/write and stack based
buffer overflow, which may cause excessive memory usage and denial of
service attacks.

CVE-2023-0645

    Specifically crafted file could cause an out of bounds read in the exif
    handler of libjxl.

CVE-2023-35790

    Integer underflow in patch decoding code of libjxl.

CVE-2024-11403

    Out of bounds write in the JPEG decoder used for recompression of JPEG
    files.

CVE-2024-11498

    Specifically crafted file could cause the JPEG XL decoder to use large
    amounts of stack space, potentially exhausting the stack.
    
For the stable distribution (bookworm), these problems have been fixed in
version 0.7.0-10+deb12u1.

We recommend that you upgrade your jpeg-xl packages.

For the detailed security status of jpeg-xl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/jpeg-xl

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEBLHAyuu1xqoC2aJ5NP8o68vMTMgFAmhne6QACgkQNP8o68vM
TMiN5Qf8CwqBGPGYI98I6xkAb5W9PoJzx4Nt0CU18KFM0Z787D0fuN1K5NHyUhvs
vtTCqufUFlSxFBlIP3QUffsJL/9UQ1T4jlxawYeGYjXArG46sgmrTdBFK+J/0lwN
m4G+qpdX4+1qeZNHfecEx57HaKBD8lMSgdnCxCFPZxjT/CeuGJD5Z82ku+kGp1fR
Vb2FzY3izzTCE4uzudLVPN2Wade90IrLtYcijYYK61Zv+WGn+3S1SOdSrTTfDO5u
+tA9ot/ilOwj0eBrmblp8s531wGZ71RAiSGj3/1OHxrCosrcarPwkw0dnFZ7GziS
ydblJUr1sYbDjLQD9MT/qe3XEvszrw==
=kMWc
-----END PGP SIGNATURE-----


Reply to: