Mageia 2021-0247: djvulibre security update | LinuxSecurity.com

Advisories

MGASA-2021-0247 - Updated djvulibre packages fix security vulnerabilities

Publication date: 13 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0247.html
Type: security
Affected Mageia releases: 7, 8
CVE: CVE-2021-3500,
     CVE-2021-32490,
     CVE-2021-32491,
     CVE-2021-32492,
     CVE-2021-32493

Stack overflow in function DJVU::DjVuDocument::get_djvu_file() via crafted 
djvu file. (CVE-2021-3500).

Out of bounds write in function DJVU::filter_bv()
via crafted djvu file. (CVE-2021-32490).

Integer overflow in function render() in tools/ddjvu via crafted djvu file.
(CVE-2021-32491)

Out of bounds read in function DJVU::DataPool::has_data() via crafted djvu 
file. (CVE-2021-32492).

Heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu 
file. (CVE-2021-32493).

References:
- https://bugs.mageia.org/show_bug.cgi?id=29000
- https://www.debian.org/lts/security/2021/dla-2667
- https://ubuntu.com/security/notices/USN-4957-1
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/AFBA3B7ZE5WL3W3IC3SJOZLTIMZPKXES/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493

SRPMS:
- 8/core/djvulibre-3.5.28-1.1.mga8
- 7/core/djvulibre-3.5.27-5.2.mga7

Mageia 2021-0247: djvulibre security update

Stack overflow in function DJVU::DjVuDocument::get_djvu_file() via crafted djvu file

Summary

Stack overflow in function DJVU::DjVuDocument::get_djvu_file() via crafted djvu file. (CVE-2021-3500).
Out of bounds write in function DJVU::filter_bv() via crafted djvu file. (CVE-2021-32490).
Integer overflow in function render() in tools/ddjvu via crafted djvu file. (CVE-2021-32491)
Out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file. (CVE-2021-32492).
Heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file. (CVE-2021-32493).

References

- https://bugs.mageia.org/show_bug.cgi?id=29000

- https://www.debian.org/lts/security/2021/dla-2667

- https://ubuntu.com/security/notices/USN-4957-1

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/AFBA3B7ZE5WL3W3IC3SJOZLTIMZPKXES/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493

Resolution

MGASA-2021-0247 - Updated djvulibre packages fix security vulnerabilities

SRPMS

- 8/core/djvulibre-3.5.28-1.1.mga8

- 7/core/djvulibre-3.5.27-5.2.mga7

Severity
Publication date: 13 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0247.html
Type: security
CVE: CVE-2021-3500, CVE-2021-32490, CVE-2021-32491, CVE-2021-32492, CVE-2021-32493

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.