Fedora 33: mingw-djvulibre 2021-3193a4c13f
Summary
MinGW Windows djvulibre library.
Apply fix for CVE-2021-3500. ---- Apply fix for CVE-2021-32490,
CVE-2021-32491, CVE-2021-32492, CVE-2021-32493
* Wed May 26 2021 Sandro Mani
- Apply fix for CVE-2021-3500
* Tue May 25 2021 Sandro Mani
- Apply fix for CVE-2021-32490, CVE-2021-32491, CVE-2021-32492, CVE-2021-32493
* Tue Jan 26 2021 Fedora Release Engineering
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
[ 1 ] Bug #1958165 - CVE-2021-3500 mingw-djvulibre: djvulibre: Stack overflow in function DJVU::DjVuDocument::get_djvu_file() via crafted djvu file [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958165
[ 2 ] Bug #1958172 - CVE-2021-32490 mingw-djvulibre: djvulibre: Out of bounds write in function DJVU::filter_bv() via crafted djvu file [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958172
[ 3 ] Bug #1958176 - CVE-2021-32491 mingw-djvulibre: djvulibre: Integer overflow in function render() in tools/ddjvu via crafted djvu file [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958176
[ 4 ] Bug #1958178 - CVE-2021-32492 mingw-djvulibre: djvulibre: Out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958178
[ 5 ] Bug #1958180 - CVE-2021-32493 mingw-djvulibre: djvulibre: Heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1958180
su -c 'dnf upgrade --advisory FEDORA-2021-3193a4c13f' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
FEDORA-2021-3193a4c13f 2021-06-04 01:02:33.600148 Product : Fedora 33 Version : 3.5.27 Release : 12.fc33 URL : https://djvu.sourceforge.net/ Summary : MinGW Windows djvulibre library Description : MinGW Windows djvulibre library. Apply fix for CVE-2021-3500. ---- Apply fix for CVE-2021-32490, CVE-2021-32491, CVE-2021-32492, CVE-2021-32493 * Wed May 26 2021 Sandro Mani - 3.5.27-12 - Apply fix for CVE-2021-3500 * Tue May 25 2021 Sandro Mani - 3.5.27-11 - Apply fix for CVE-2021-32490, CVE-2021-32491, CVE-2021-32492, CVE-2021-32493 * Tue Jan 26 2021 Fedora Release Engineering - 3.5.27-10 - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild [ 1 ] Bug #1958165 - CVE-2021-3500 mingw-djvulibre: djvulibre: Stack overflow in function DJVU::DjVuDocument::get_djvu_file() via crafted djvu file [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958165 [ 2 ] Bug #1958172 - CVE-2021-32490 mingw-djvulibre: djvulibre: Out of bounds write in function DJVU::filter_bv() via crafted djvu file [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958172 [ 3 ] Bug #1958176 - CVE-2021-32491 mingw-djvulibre: djvulibre: Integer overflow in function render() in tools/ddjvu via crafted djvu file [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958176 [ 4 ] Bug #1958178 - CVE-2021-32492 mingw-djvulibre: djvulibre: Out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958178 [ 5 ] Bug #1958180 - CVE-2021-32493 mingw-djvulibre: djvulibre: Heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1958180 su -c 'dnf upgrade --advisory FEDORA-2021-3193a4c13f' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/ Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Change Log
References