JLSEC-2025-179

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-179.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-179.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2025-179
Upstream
Published
2025-10-21T17:39:06.495Z
Modified
2025-11-03T00:18:46.089358Z
Summary
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component
Details

Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.

Database specific
{
    "sources": [
        {
            "imported": "2025-10-21T15:03:32.798Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2020-17541",
            "modified": "2024-11-21T05:08:19.537Z",
            "id": "CVE-2020-17541",
            "published": "2021-06-01T15:15:07.417Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17541"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / JpegTurbo_jll

Package

Name
JpegTurbo_jll
Purl
pkg:julia/JpegTurbo_jll?uuid=aacddb02-875f-59d6-b918-886e6ef4fbf8

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0+0