-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5958-1 security@debian.org https://www.debian.org/security/ Aron Xu July 04, 2025 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : jpeg-xl CVE ID : CVE-2023-0645 CVE-2023-35790 CVE-2024-11403 CVE-2024-11498 Debian Bug : 1034722 1055306 1088818 Multiple vulnerabilities are discovered in jpeg-xl, the JPEG XL ("JXL") image coding library, including out of bounds read/write and stack based buffer overflow, which may cause excessive memory usage and denial of service attacks. CVE-2023-0645 Specifically crafted file could cause an out of bounds read in the exif handler of libjxl. CVE-2023-35790 Integer underflow in patch decoding code of libjxl. CVE-2024-11403 Out of bounds write in the JPEG decoder used for recompression of JPEG files. CVE-2024-11498 Specifically crafted file could cause the JPEG XL decoder to use large amounts of stack space, potentially exhausting the stack. For the stable distribution (bookworm), these problems have been fixed in version 0.7.0-10+deb12u1. We recommend that you upgrade your jpeg-xl packages. For the detailed security status of jpeg-xl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/jpeg-xl Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEBLHAyuu1xqoC2aJ5NP8o68vMTMgFAmhne6QACgkQNP8o68vM TMiN5Qf8CwqBGPGYI98I6xkAb5W9PoJzx4Nt0CU18KFM0Z787D0fuN1K5NHyUhvs vtTCqufUFlSxFBlIP3QUffsJL/9UQ1T4jlxawYeGYjXArG46sgmrTdBFK+J/0lwN m4G+qpdX4+1qeZNHfecEx57HaKBD8lMSgdnCxCFPZxjT/CeuGJD5Z82ku+kGp1fR Vb2FzY3izzTCE4uzudLVPN2Wade90IrLtYcijYYK61Zv+WGn+3S1SOdSrTTfDO5u +tA9ot/ilOwj0eBrmblp8s531wGZ71RAiSGj3/1OHxrCosrcarPwkw0dnFZ7GziS ydblJUr1sYbDjLQD9MT/qe3XEvszrw==kMWc -----END PGP SIGNATURE-----