Summary: | <media-libs/libjxl-0.8.2: integer underflow leading to infinite loop | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | John Helmert III <ajak> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | CONFIRMED --- | ||
Severity: | minor | CC: | ajak, dnovomesky, mgorny, proxy-maint |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://github.com/libjxl/libjxl/releases/tag/v0.8.2 | ||
Whiteboard: | B3 [glsa?] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 922501 | ||
Bug Blocks: |
Description
John Helmert III
![]() ![]() ![]() ![]() It's an infinite loop bug, we will upgrade libjxl. This is CVE-2023-35790: An issue was discovered in dec_patch_dictionary.cc in libjxl before 0.8.2. An integer underflow in patch decoding can lead to a denial of service, such as an infinite loop. I believe that libjxl-0.8.2-r1 should be made stable and older versions removed afterwards. cleanup done. |