Updated djvulibre packages fix security vulnerabilities
Publication date: 30 Nov 2019Modification date: 30 Nov 2019
Type: security
Affected Mageia releases : 7
CVE: CVE-2019-15142 , CVE-2019-15143 , CVE-2019-15144 , CVE-2019-15145 , CVE-2019-18804
Description
The updated packages fix security vulnerabilities: In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file. (CVE-2019-15142) In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp. (CVE-2019-15143) In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h. (CVE-2019-15144) DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h. (CVE-2019-15145) DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp. (CVE-2019-18804)
References
- https://bugs.mageia.org/show_bug.cgi?id=25730
- https://usn.ubuntu.com/4198-1/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804
SRPMS
7/core
- djvulibre-3.5.27-5.1.mga7