vulnerability
Ubuntu: USN-7631-1 (CVE-2025-53367): DjVuLibre vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Jul 3, 2025 | Jul 10, 2025 | Jan 16, 2026 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Jul 3, 2025
Added
Jul 10, 2025
Modified
Jan 16, 2026
Description
DjVuLibre is a GPL implementation of DjVu, a web-centric format for distributing documents and images. Prior to version 3.5.29, the MMRDecoder::scanruns method is affected by an OOB-write vulnerability, because it does not check that the xr pointer stays within the bounds of the allocated buffer. This can lead to writes beyond the allocated memory, resulting in a heap corruption condition. An out-of-bounds read with pr is also possible for the same reason. This issue has been patched in version 3.5.29.
Solution
ubuntu-upgrade-libdjvulibre21
References
- CVE-2025-53367
- https://attackerkb.com/topics/CVE-2025-53367
- CWE-125
- CWE-787
- UBUNTU-USN-7631-1
- URL-https://github.blog/security/vulnerability-research/cve-2025-53367-an-exploitable-out-of-bounds-write-in-djvulibre
- URL-https://securitylab.github.com/advisories/GHSL-2025-055_DjVuLibre/
- URL-https://ubuntu.com/security/notices/USN-7631-1
- URL-https://www.cve.org/CVERecord?id=CVE-2025-53367
- URL-https://www.openwall.com/lists/oss-security/2025/07/03/1
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.