Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-12474 (GCVE-0-2025-12474)
Vulnerability from cvelistv5 – Published: 2026-02-11 15:27 – Updated: 2026-02-11 21:41
VLAI?
EPSS
Title
libjxl: Uninitialized memory read in decoder due to incorrect optimization in patch handling
Summary
A specially-crafted file can cause libjxl's decoder to read pixel data from uninitialized (but allocated) memory.
This can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.
Severity ?
CWE
- CWE-908 - Use of Uninitialized Resource
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-12474",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-11T21:41:29.565595Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-11T21:41:40.223Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "libjxl",
"vendor": "Google",
"versions": [
{
"lessThanOrEqual": "0.11.1",
"status": "affected",
"version": "0.7",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA specially-crafted file can cause libjxl\u0027s decoder to read pixel data from uninitialized (but allocated) memory.\u003c/p\u003e\u003cp\u003eThis can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.\u003c/p\u003e\u003cbr\u003e"
}
],
"value": "A specially-crafted file can cause libjxl\u0027s decoder to read pixel data from uninitialized (but allocated) memory.\n\nThis can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas."
}
],
"impacts": [
{
"capecId": "CAPEC-44",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-44 Overflow Binary Resource File"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 2.3,
"baseSeverity": "LOW",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-908",
"description": "CWE-908 Use of Uninitialized Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-11T15:27:24.118Z",
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"shortName": "Google"
},
"references": [
{
"url": "https://github.com/libjxl/libjxl/pull/4495"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "libjxl: Uninitialized memory read in decoder due to incorrect optimization in patch handling",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"assignerShortName": "Google",
"cveId": "CVE-2025-12474",
"datePublished": "2026-02-11T15:27:24.118Z",
"dateReserved": "2025-10-29T16:11:30.108Z",
"dateUpdated": "2026-02-11T21:41:40.223Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-12474\",\"sourceIdentifier\":\"cve-coordination@google.com\",\"published\":\"2026-02-11T16:15:53.647\",\"lastModified\":\"2026-02-11T18:06:04.010\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A specially-crafted file can cause libjxl\u0027s decoder to read pixel data from uninitialized (but allocated) memory.\\n\\nThis can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":2.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"PASSIVE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-908\"}]}],\"references\":[{\"url\":\"https://github.com/libjxl/libjxl/pull/4495\",\"source\":\"cve-coordination@google.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-12474\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-02-11T21:41:29.565595Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-02-11T21:41:33.922Z\"}}], \"cna\": {\"title\": \"libjxl: Uninitialized memory read in decoder due to incorrect optimization in patch handling\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"capecId\": \"CAPEC-44\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-44 Overflow Binary Resource File\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 2.3, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"PASSIVE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"LOW\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"LOW\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Google\", \"product\": \"libjxl\", \"versions\": [{\"status\": \"affected\", \"version\": \"0.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"0.11.1\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://github.com/libjxl/libjxl/pull/4495\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A specially-crafted file can cause libjxl\u0027s decoder to read pixel data from uninitialized (but allocated) memory.\\n\\nThis can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eA specially-crafted file can cause libjxl\u0027s decoder to read pixel data from uninitialized (but allocated) memory.\u003c/p\u003e\u003cp\u003eThis can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.\u003c/p\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-908\", \"description\": \"CWE-908 Use of Uninitialized Resource\"}]}], \"providerMetadata\": {\"orgId\": \"14ed7db2-1595-443d-9d34-6215bf890778\", \"shortName\": \"Google\", \"dateUpdated\": \"2026-02-11T15:27:24.118Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-12474\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-11T21:41:40.223Z\", \"dateReserved\": \"2025-10-29T16:11:30.108Z\", \"assignerOrgId\": \"14ed7db2-1595-443d-9d34-6215bf890778\", \"datePublished\": \"2026-02-11T15:27:24.118Z\", \"assignerShortName\": \"Google\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
OPENSUSE-SU-2026:20385-1
Vulnerability from csaf_opensuse - Published: 2026-03-18 10:13 - Updated: 2026-03-18 10:13Summary
Security update for libjxl
Severity
Important
Notes
Title of the patch: Security update for libjxl
Description of the patch: This update for libjxl fixes the following issues:
Update to libjxl 0.11.2:
- CVE-2025-12474: a specially crafted file can cause the decoder to read pixel data from uninitialized allocated memory
(bsc#1258090).
- CVE-2026-1837: a specially crafted file can cause the decoder to write pixel data to uninitialized unallocated memory
(bsc#1258091).
Patchnames: openSUSE-Leap-16.0-403
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libjxl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libjxl fixes the following issues:\n\nUpdate to libjxl 0.11.2:\n\n- CVE-2025-12474: a specially crafted file can cause the decoder to read pixel data from uninitialized allocated memory\n (bsc#1258090).\n- CVE-2026-1837: a specially crafted file can cause the decoder to write pixel data to uninitialized unallocated memory\n (bsc#1258091).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-403",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20385-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1258090",
"url": "https://bugzilla.suse.com/1258090"
},
{
"category": "self",
"summary": "SUSE Bug 1258091",
"url": "https://bugzilla.suse.com/1258091"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-12474 page",
"url": "https://www.suse.com/security/cve/CVE-2025-12474/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1837 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1837/"
}
],
"title": "Security update for libjxl",
"tracking": {
"current_release_date": "2026-03-18T10:13:37Z",
"generator": {
"date": "2026-03-18T10:13:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20385-1",
"initial_release_date": "2026-03-18T10:13:37Z",
"revision_history": [
{
"date": "2026-03-18T10:13:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libjxl-devel-0.11.2-160000.1.1.aarch64",
"product": {
"name": "libjxl-devel-0.11.2-160000.1.1.aarch64",
"product_id": "libjxl-devel-0.11.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjxl-tools-0.11.2-160000.1.1.aarch64",
"product": {
"name": "libjxl-tools-0.11.2-160000.1.1.aarch64",
"product_id": "libjxl-tools-0.11.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjxl0_11-0.11.2-160000.1.1.aarch64",
"product": {
"name": "libjxl0_11-0.11.2-160000.1.1.aarch64",
"product_id": "libjxl0_11-0.11.2-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libjxl-devel-0.11.2-160000.1.1.ppc64le",
"product": {
"name": "libjxl-devel-0.11.2-160000.1.1.ppc64le",
"product_id": "libjxl-devel-0.11.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjxl-tools-0.11.2-160000.1.1.ppc64le",
"product": {
"name": "libjxl-tools-0.11.2-160000.1.1.ppc64le",
"product_id": "libjxl-tools-0.11.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjxl0_11-0.11.2-160000.1.1.ppc64le",
"product": {
"name": "libjxl0_11-0.11.2-160000.1.1.ppc64le",
"product_id": "libjxl0_11-0.11.2-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libjxl-devel-0.11.2-160000.1.1.s390x",
"product": {
"name": "libjxl-devel-0.11.2-160000.1.1.s390x",
"product_id": "libjxl-devel-0.11.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libjxl-tools-0.11.2-160000.1.1.s390x",
"product": {
"name": "libjxl-tools-0.11.2-160000.1.1.s390x",
"product_id": "libjxl-tools-0.11.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libjxl0_11-0.11.2-160000.1.1.s390x",
"product": {
"name": "libjxl0_11-0.11.2-160000.1.1.s390x",
"product_id": "libjxl0_11-0.11.2-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libjxl-devel-0.11.2-160000.1.1.x86_64",
"product": {
"name": "libjxl-devel-0.11.2-160000.1.1.x86_64",
"product_id": "libjxl-devel-0.11.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjxl-tools-0.11.2-160000.1.1.x86_64",
"product": {
"name": "libjxl-tools-0.11.2-160000.1.1.x86_64",
"product_id": "libjxl-tools-0.11.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjxl0_11-0.11.2-160000.1.1.x86_64",
"product": {
"name": "libjxl0_11-0.11.2-160000.1.1.x86_64",
"product_id": "libjxl0_11-0.11.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"product": {
"name": "libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"product_id": "libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.11.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64"
},
"product_reference": "libjxl-devel-0.11.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.11.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le"
},
"product_reference": "libjxl-devel-0.11.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.11.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.s390x"
},
"product_reference": "libjxl-devel-0.11.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.11.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64"
},
"product_reference": "libjxl-devel-0.11.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-tools-0.11.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.aarch64"
},
"product_reference": "libjxl-tools-0.11.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-tools-0.11.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.ppc64le"
},
"product_reference": "libjxl-tools-0.11.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-tools-0.11.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.s390x"
},
"product_reference": "libjxl-tools-0.11.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-tools-0.11.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.x86_64"
},
"product_reference": "libjxl-tools-0.11.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-0.11.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64"
},
"product_reference": "libjxl0_11-0.11.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-0.11.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le"
},
"product_reference": "libjxl0_11-0.11.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-0.11.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.s390x"
},
"product_reference": "libjxl0_11-0.11.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-0.11.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64"
},
"product_reference": "libjxl0_11-0.11.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
},
"product_reference": "libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-12474",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-12474"
}
],
"notes": [
{
"category": "general",
"text": "A specially-crafted file can cause libjxl\u0027s decoder to read pixel data from uninitialized (but allocated) memory.\n\nThis can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-12474",
"url": "https://www.suse.com/security/cve/CVE-2025-12474"
},
{
"category": "external",
"summary": "SUSE Bug 1258090 for CVE-2025-12474",
"url": "https://bugzilla.suse.com/1258090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T10:13:37Z",
"details": "moderate"
}
],
"title": "CVE-2025-12474"
},
{
"cve": "CVE-2026-1837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1837"
}
],
"notes": [
{
"category": "general",
"text": "A specially-crafted file can cause libjxl\u0027s decoder to write pixel data to uninitialized unallocated memory. Soon after that data from another uninitialized unallocated region is copied to pixel data.\n\nThis can be done by requesting color transformation of grayscale images to another grayscale color space. Buffers allocated for 1-float-per-pixel are used as if they are allocated for 3-float-per-pixel. That happens only if LCMS2 is used as CMS engine. There is another CMS engine available (selected by build flags).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1837",
"url": "https://www.suse.com/security/cve/CVE-2026-1837"
},
{
"category": "external",
"summary": "SUSE Bug 1258091 for CVE-2026-1837",
"url": "https://bugzilla.suse.com/1258091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl-tools-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"openSUSE Leap 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T10:13:37Z",
"details": "important"
}
],
"title": "CVE-2026-1837"
}
]
}
SUSE-SU-2026:0648-1
Vulnerability from csaf_suse - Published: 2026-02-25 16:30 - Updated: 2026-02-25 16:30Summary
Security update for libjxl
Severity
Important
Notes
Title of the patch: Security update for libjxl
Description of the patch: This update for libjxl fixes the following issues:
- CVE-2025-12474: a specially crafted file can cause the decoder to read pixel data from uninitialized allocated memory
(bsc#1258090).
- CVE-2026-1837: a specially crafted file can cause the decoder to write pixel data to uninitialized unallocated memory
(bsc#1258091).
Patchnames: SUSE-2026-648,SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-648
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libjxl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libjxl fixes the following issues:\n\n- CVE-2025-12474: a specially crafted file can cause the decoder to read pixel data from uninitialized allocated memory\n (bsc#1258090).\n- CVE-2026-1837: a specially crafted file can cause the decoder to write pixel data to uninitialized unallocated memory\n (bsc#1258091).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-648,SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-648",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0648-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0648-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260648-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0648-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024399.html"
},
{
"category": "self",
"summary": "SUSE Bug 1258090",
"url": "https://bugzilla.suse.com/1258090"
},
{
"category": "self",
"summary": "SUSE Bug 1258091",
"url": "https://bugzilla.suse.com/1258091"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-12474 page",
"url": "https://www.suse.com/security/cve/CVE-2025-12474/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1837 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1837/"
}
],
"title": "Security update for libjxl",
"tracking": {
"current_release_date": "2026-02-25T16:30:57Z",
"generator": {
"date": "2026-02-25T16:30:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0648-1",
"initial_release_date": "2026-02-25T16:30:57Z",
"revision_history": [
{
"date": "2026-02-25T16:30:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.aarch64",
"product": {
"name": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.aarch64",
"product_id": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-jxl-0.10.3-150700.4.6.1.aarch64",
"product": {
"name": "gimp-plugin-jxl-0.10.3-150700.4.6.1.aarch64",
"product_id": "gimp-plugin-jxl-0.10.3-150700.4.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjxl-devel-0.10.3-150700.4.6.1.aarch64",
"product": {
"name": "libjxl-devel-0.10.3-150700.4.6.1.aarch64",
"product_id": "libjxl-devel-0.10.3-150700.4.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjxl-tools-0.10.3-150700.4.6.1.aarch64",
"product": {
"name": "libjxl-tools-0.10.3-150700.4.6.1.aarch64",
"product_id": "libjxl-tools-0.10.3-150700.4.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjxl0_10-0.10.3-150700.4.6.1.aarch64",
"product": {
"name": "libjxl0_10-0.10.3-150700.4.6.1.aarch64",
"product_id": "libjxl0_10-0.10.3-150700.4.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libjxl0_10-64bit-0.10.3-150700.4.6.1.aarch64_ilp32",
"product": {
"name": "libjxl0_10-64bit-0.10.3-150700.4.6.1.aarch64_ilp32",
"product_id": "libjxl0_10-64bit-0.10.3-150700.4.6.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.i586",
"product": {
"name": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.i586",
"product_id": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.i586"
}
},
{
"category": "product_version",
"name": "gimp-plugin-jxl-0.10.3-150700.4.6.1.i586",
"product": {
"name": "gimp-plugin-jxl-0.10.3-150700.4.6.1.i586",
"product_id": "gimp-plugin-jxl-0.10.3-150700.4.6.1.i586"
}
},
{
"category": "product_version",
"name": "libjxl-devel-0.10.3-150700.4.6.1.i586",
"product": {
"name": "libjxl-devel-0.10.3-150700.4.6.1.i586",
"product_id": "libjxl-devel-0.10.3-150700.4.6.1.i586"
}
},
{
"category": "product_version",
"name": "libjxl-tools-0.10.3-150700.4.6.1.i586",
"product": {
"name": "libjxl-tools-0.10.3-150700.4.6.1.i586",
"product_id": "libjxl-tools-0.10.3-150700.4.6.1.i586"
}
},
{
"category": "product_version",
"name": "libjxl0_10-0.10.3-150700.4.6.1.i586",
"product": {
"name": "libjxl0_10-0.10.3-150700.4.6.1.i586",
"product_id": "libjxl0_10-0.10.3-150700.4.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "jxl-thumbnailer-0.10.3-150700.4.6.1.noarch",
"product": {
"name": "jxl-thumbnailer-0.10.3-150700.4.6.1.noarch",
"product_id": "jxl-thumbnailer-0.10.3-150700.4.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.ppc64le",
"product": {
"name": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.ppc64le",
"product_id": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gimp-plugin-jxl-0.10.3-150700.4.6.1.ppc64le",
"product": {
"name": "gimp-plugin-jxl-0.10.3-150700.4.6.1.ppc64le",
"product_id": "gimp-plugin-jxl-0.10.3-150700.4.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjxl-devel-0.10.3-150700.4.6.1.ppc64le",
"product": {
"name": "libjxl-devel-0.10.3-150700.4.6.1.ppc64le",
"product_id": "libjxl-devel-0.10.3-150700.4.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjxl-tools-0.10.3-150700.4.6.1.ppc64le",
"product": {
"name": "libjxl-tools-0.10.3-150700.4.6.1.ppc64le",
"product_id": "libjxl-tools-0.10.3-150700.4.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjxl0_10-0.10.3-150700.4.6.1.ppc64le",
"product": {
"name": "libjxl0_10-0.10.3-150700.4.6.1.ppc64le",
"product_id": "libjxl0_10-0.10.3-150700.4.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.s390x",
"product": {
"name": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.s390x",
"product_id": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.s390x"
}
},
{
"category": "product_version",
"name": "gimp-plugin-jxl-0.10.3-150700.4.6.1.s390x",
"product": {
"name": "gimp-plugin-jxl-0.10.3-150700.4.6.1.s390x",
"product_id": "gimp-plugin-jxl-0.10.3-150700.4.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libjxl-devel-0.10.3-150700.4.6.1.s390x",
"product": {
"name": "libjxl-devel-0.10.3-150700.4.6.1.s390x",
"product_id": "libjxl-devel-0.10.3-150700.4.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libjxl-tools-0.10.3-150700.4.6.1.s390x",
"product": {
"name": "libjxl-tools-0.10.3-150700.4.6.1.s390x",
"product_id": "libjxl-tools-0.10.3-150700.4.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libjxl0_10-0.10.3-150700.4.6.1.s390x",
"product": {
"name": "libjxl0_10-0.10.3-150700.4.6.1.s390x",
"product_id": "libjxl0_10-0.10.3-150700.4.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.x86_64",
"product": {
"name": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.x86_64",
"product_id": "gdk-pixbuf-loader-jxl-0.10.3-150700.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gimp-plugin-jxl-0.10.3-150700.4.6.1.x86_64",
"product": {
"name": "gimp-plugin-jxl-0.10.3-150700.4.6.1.x86_64",
"product_id": "gimp-plugin-jxl-0.10.3-150700.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjxl-devel-0.10.3-150700.4.6.1.x86_64",
"product": {
"name": "libjxl-devel-0.10.3-150700.4.6.1.x86_64",
"product_id": "libjxl-devel-0.10.3-150700.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjxl-tools-0.10.3-150700.4.6.1.x86_64",
"product": {
"name": "libjxl-tools-0.10.3-150700.4.6.1.x86_64",
"product_id": "libjxl-tools-0.10.3-150700.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjxl0_10-0.10.3-150700.4.6.1.x86_64",
"product": {
"name": "libjxl0_10-0.10.3-150700.4.6.1.x86_64",
"product_id": "libjxl0_10-0.10.3-150700.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjxl0_10-32bit-0.10.3-150700.4.6.1.x86_64",
"product": {
"name": "libjxl0_10-32bit-0.10.3-150700.4.6.1.x86_64",
"product_id": "libjxl0_10-32bit-0.10.3-150700.4.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.10.3-150700.4.6.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.aarch64"
},
"product_reference": "libjxl-devel-0.10.3-150700.4.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.10.3-150700.4.6.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.ppc64le"
},
"product_reference": "libjxl-devel-0.10.3-150700.4.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.10.3-150700.4.6.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.s390x"
},
"product_reference": "libjxl-devel-0.10.3-150700.4.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.10.3-150700.4.6.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.x86_64"
},
"product_reference": "libjxl-devel-0.10.3-150700.4.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-tools-0.10.3-150700.4.6.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.aarch64"
},
"product_reference": "libjxl-tools-0.10.3-150700.4.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-tools-0.10.3-150700.4.6.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.ppc64le"
},
"product_reference": "libjxl-tools-0.10.3-150700.4.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-tools-0.10.3-150700.4.6.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.s390x"
},
"product_reference": "libjxl-tools-0.10.3-150700.4.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-tools-0.10.3-150700.4.6.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.x86_64"
},
"product_reference": "libjxl-tools-0.10.3-150700.4.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_10-0.10.3-150700.4.6.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.aarch64"
},
"product_reference": "libjxl0_10-0.10.3-150700.4.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_10-0.10.3-150700.4.6.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.ppc64le"
},
"product_reference": "libjxl0_10-0.10.3-150700.4.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_10-0.10.3-150700.4.6.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.s390x"
},
"product_reference": "libjxl0_10-0.10.3-150700.4.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_10-0.10.3-150700.4.6.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.x86_64"
},
"product_reference": "libjxl0_10-0.10.3-150700.4.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_10-32bit-0.10.3-150700.4.6.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-32bit-0.10.3-150700.4.6.1.x86_64"
},
"product_reference": "libjxl0_10-32bit-0.10.3-150700.4.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-12474",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-12474"
}
],
"notes": [
{
"category": "general",
"text": "A specially-crafted file can cause libjxl\u0027s decoder to read pixel data from uninitialized (but allocated) memory.\n\nThis can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-32bit-0.10.3-150700.4.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-12474",
"url": "https://www.suse.com/security/cve/CVE-2025-12474"
},
{
"category": "external",
"summary": "SUSE Bug 1258090 for CVE-2025-12474",
"url": "https://bugzilla.suse.com/1258090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-32bit-0.10.3-150700.4.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-32bit-0.10.3-150700.4.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-25T16:30:57Z",
"details": "moderate"
}
],
"title": "CVE-2025-12474"
},
{
"cve": "CVE-2026-1837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1837"
}
],
"notes": [
{
"category": "general",
"text": "A specially-crafted file can cause libjxl\u0027s decoder to write pixel data to uninitialized unallocated memory. Soon after that data from another uninitialized unallocated region is copied to pixel data.\n\nThis can be done by requesting color transformation of grayscale images to another grayscale color space. Buffers allocated for 1-float-per-pixel are used as if they are allocated for 3-float-per-pixel. That happens only if LCMS2 is used as CMS engine. There is another CMS engine available (selected by build flags).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-32bit-0.10.3-150700.4.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1837",
"url": "https://www.suse.com/security/cve/CVE-2026-1837"
},
{
"category": "external",
"summary": "SUSE Bug 1258091 for CVE-2026-1837",
"url": "https://bugzilla.suse.com/1258091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-32bit-0.10.3-150700.4.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-devel-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl-tools-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-0.10.3-150700.4.6.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:libjxl0_10-32bit-0.10.3-150700.4.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-25T16:30:57Z",
"details": "important"
}
],
"title": "CVE-2026-1837"
}
]
}
SUSE-SU-2026:20903-1
Vulnerability from csaf_suse - Published: 2026-03-18 10:12 - Updated: 2026-03-18 10:12Summary
Security update for libjxl
Severity
Important
Notes
Title of the patch: Security update for libjxl
Description of the patch: This update for libjxl fixes the following issues:
Update to libjxl 0.11.2:
- CVE-2025-12474: a specially crafted file can cause the decoder to read pixel data from uninitialized allocated memory
(bsc#1258090).
- CVE-2026-1837: a specially crafted file can cause the decoder to write pixel data to uninitialized unallocated memory
(bsc#1258091).
Patchnames: SUSE-SLES-16.0-403
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libjxl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libjxl fixes the following issues:\n\nUpdate to libjxl 0.11.2:\n\n- CVE-2025-12474: a specially crafted file can cause the decoder to read pixel data from uninitialized allocated memory\n (bsc#1258090).\n- CVE-2026-1837: a specially crafted file can cause the decoder to write pixel data to uninitialized unallocated memory\n (bsc#1258091).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-403",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20903-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20903-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620903-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20903-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025110.html"
},
{
"category": "self",
"summary": "SUSE Bug 1258090",
"url": "https://bugzilla.suse.com/1258090"
},
{
"category": "self",
"summary": "SUSE Bug 1258091",
"url": "https://bugzilla.suse.com/1258091"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-12474 page",
"url": "https://www.suse.com/security/cve/CVE-2025-12474/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1837 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1837/"
}
],
"title": "Security update for libjxl",
"tracking": {
"current_release_date": "2026-03-18T10:12:38Z",
"generator": {
"date": "2026-03-18T10:12:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20903-1",
"initial_release_date": "2026-03-18T10:12:38Z",
"revision_history": [
{
"date": "2026-03-18T10:12:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libjxl-devel-0.11.2-160000.1.1.aarch64",
"product": {
"name": "libjxl-devel-0.11.2-160000.1.1.aarch64",
"product_id": "libjxl-devel-0.11.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjxl0_11-0.11.2-160000.1.1.aarch64",
"product": {
"name": "libjxl0_11-0.11.2-160000.1.1.aarch64",
"product_id": "libjxl0_11-0.11.2-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libjxl-devel-0.11.2-160000.1.1.ppc64le",
"product": {
"name": "libjxl-devel-0.11.2-160000.1.1.ppc64le",
"product_id": "libjxl-devel-0.11.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjxl0_11-0.11.2-160000.1.1.ppc64le",
"product": {
"name": "libjxl0_11-0.11.2-160000.1.1.ppc64le",
"product_id": "libjxl0_11-0.11.2-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libjxl-devel-0.11.2-160000.1.1.s390x",
"product": {
"name": "libjxl-devel-0.11.2-160000.1.1.s390x",
"product_id": "libjxl-devel-0.11.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "libjxl0_11-0.11.2-160000.1.1.s390x",
"product": {
"name": "libjxl0_11-0.11.2-160000.1.1.s390x",
"product_id": "libjxl0_11-0.11.2-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libjxl-devel-0.11.2-160000.1.1.x86_64",
"product": {
"name": "libjxl-devel-0.11.2-160000.1.1.x86_64",
"product_id": "libjxl-devel-0.11.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjxl0_11-0.11.2-160000.1.1.x86_64",
"product": {
"name": "libjxl0_11-0.11.2-160000.1.1.x86_64",
"product_id": "libjxl0_11-0.11.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"product": {
"name": "libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"product_id": "libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.11.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64"
},
"product_reference": "libjxl-devel-0.11.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.11.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le"
},
"product_reference": "libjxl-devel-0.11.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.11.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.s390x"
},
"product_reference": "libjxl-devel-0.11.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.11.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64"
},
"product_reference": "libjxl-devel-0.11.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-0.11.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64"
},
"product_reference": "libjxl0_11-0.11.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-0.11.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le"
},
"product_reference": "libjxl0_11-0.11.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-0.11.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.s390x"
},
"product_reference": "libjxl0_11-0.11.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-0.11.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64"
},
"product_reference": "libjxl0_11-0.11.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
},
"product_reference": "libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.11.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64"
},
"product_reference": "libjxl-devel-0.11.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.11.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le"
},
"product_reference": "libjxl-devel-0.11.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.11.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.s390x"
},
"product_reference": "libjxl-devel-0.11.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl-devel-0.11.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64"
},
"product_reference": "libjxl-devel-0.11.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-0.11.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64"
},
"product_reference": "libjxl0_11-0.11.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-0.11.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le"
},
"product_reference": "libjxl0_11-0.11.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-0.11.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.s390x"
},
"product_reference": "libjxl0_11-0.11.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-0.11.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64"
},
"product_reference": "libjxl0_11-0.11.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
},
"product_reference": "libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-12474",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-12474"
}
],
"notes": [
{
"category": "general",
"text": "A specially-crafted file can cause libjxl\u0027s decoder to read pixel data from uninitialized (but allocated) memory.\n\nThis can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-12474",
"url": "https://www.suse.com/security/cve/CVE-2025-12474"
},
{
"category": "external",
"summary": "SUSE Bug 1258090 for CVE-2025-12474",
"url": "https://bugzilla.suse.com/1258090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T10:12:38Z",
"details": "moderate"
}
],
"title": "CVE-2025-12474"
},
{
"cve": "CVE-2026-1837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1837"
}
],
"notes": [
{
"category": "general",
"text": "A specially-crafted file can cause libjxl\u0027s decoder to write pixel data to uninitialized unallocated memory. Soon after that data from another uninitialized unallocated region is copied to pixel data.\n\nThis can be done by requesting color transformation of grayscale images to another grayscale color space. Buffers allocated for 1-float-per-pixel are used as if they are allocated for 3-float-per-pixel. That happens only if LCMS2 is used as CMS engine. There is another CMS engine available (selected by build flags).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1837",
"url": "https://www.suse.com/security/cve/CVE-2026-1837"
},
{
"category": "external",
"summary": "SUSE Bug 1258091 for CVE-2026-1837",
"url": "https://bugzilla.suse.com/1258091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl-devel-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-0.11.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libjxl0_11-x86-64-v3-0.11.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T10:12:38Z",
"details": "important"
}
],
"title": "CVE-2026-1837"
}
]
}
FKIE_CVE-2025-12474
Vulnerability from fkie_nvd - Published: 2026-02-11 16:15 - Updated: 2026-02-11 18:06
Severity ?
Summary
A specially-crafted file can cause libjxl's decoder to read pixel data from uninitialized (but allocated) memory.
This can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A specially-crafted file can cause libjxl\u0027s decoder to read pixel data from uninitialized (but allocated) memory.\n\nThis can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas."
},
{
"lang": "es",
"value": "Un archivo especialmente dise\u00f1ado puede provocar que el decodificador de libjxl lea datos de p\u00edxeles de memoria no inicializada (pero asignada).\n\nEsto se puede lograr al provocar que el decodificador haga referencia a un \u00e1rea fuera de los l\u00edmites de la imagen en parches posteriores. Una optimizaci\u00f3n incorrecta provoca que el decodificador omita poblar esas \u00e1reas."
}
],
"id": "CVE-2025-12474",
"lastModified": "2026-02-11T18:06:04.010",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cve-coordination@google.com",
"type": "Secondary"
}
]
},
"published": "2026-02-11T16:15:53.647",
"references": [
{
"source": "cve-coordination@google.com",
"url": "https://github.com/libjxl/libjxl/pull/4495"
}
],
"sourceIdentifier": "cve-coordination@google.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-908"
}
],
"source": "cve-coordination@google.com",
"type": "Secondary"
}
]
}
GHSA-9GVG-FW8P-72FV
Vulnerability from github – Published: 2026-02-11 18:31 – Updated: 2026-02-11 18:31
VLAI?
Details
A specially-crafted file can cause libjxl's decoder to read pixel data from uninitialized (but allocated) memory.
This can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.
Severity ?
{
"affected": [],
"aliases": [
"CVE-2025-12474"
],
"database_specific": {
"cwe_ids": [
"CWE-908"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-02-11T16:15:53Z",
"severity": "LOW"
},
"details": "A specially-crafted file can cause libjxl\u0027s decoder to read pixel data from uninitialized (but allocated) memory.\n\nThis can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.",
"id": "GHSA-9gvg-fw8p-72fv",
"modified": "2026-02-11T18:31:28Z",
"published": "2026-02-11T18:31:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12474"
},
{
"type": "WEB",
"url": "https://github.com/libjxl/libjxl/pull/4495"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…