vulnerability
Arch Linux: Arbitrary code execution (CVE-2025-53367)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Jul 3, 2025 | Jul 11, 2025 | Jan 16, 2026 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Jul 3, 2025
Added
Jul 11, 2025
Modified
Jan 16, 2026
Description
A vulnerability was found in djvulibre. The MMRDecoder::scanruns method is affected by an OOB-write vulnerability, because it does not check that the xr pointer stays within the bounds of the allocated buffer. This can lead to writes beyond the allocated memory, resulting in a heap corruption condition. An out-of-bounds read with pr is also possible for the same reason.
Solution
arch-linux-upgrade-latest
References
- CVE-2025-53367
- https://attackerkb.com/topics/CVE-2025-53367
- URL-https://github.blog/security/vulnerability-research/cve-2025-53367-an-exploitable-out-of-bounds-write-in-djvulibre
- URL-https://github.com/github/securitylab/tree/main/SecurityExploits/DjVuLibre/MMRDecoder_scanruns_CVE-2025-53367
- URL-https://securitylab.github.com/advisories/GHSL-2025-055_DjVuLibre/
- URL-https://sourceforge.net/p/djvu/djvulibre-git/ci/33f645196593d70bd5e37f55b63886c31c82c3da
- URL-https://www.openwall.com/lists/oss-security/2025/07/03/1
- CWE-787
- CWE-125
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.