Updated djvulibre packages fix security vulnerabilities
Publication date: 13 Jun 2021Modification date: 13 Jun 2021
Type: security
Affected Mageia releases : 7 , 8
CVE: CVE-2021-3500 , CVE-2021-32490 , CVE-2021-32491 , CVE-2021-32492 , CVE-2021-32493
Description
Stack overflow in function DJVU::DjVuDocument::get_djvu_file() via crafted djvu file. (CVE-2021-3500). Out of bounds write in function DJVU::filter_bv() via crafted djvu file. (CVE-2021-32490). Integer overflow in function render() in tools/ddjvu via crafted djvu file. (CVE-2021-32491) Out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file. (CVE-2021-32492). Heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file. (CVE-2021-32493).
References
- https://bugs.mageia.org/show_bug.cgi?id=29000
- https://www.debian.org/lts/security/2021/dla-2667
- https://ubuntu.com/security/notices/USN-4957-1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/AFBA3B7ZE5WL3W3IC3SJOZLTIMZPKXES/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32490
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493
SRPMS
8/core
- djvulibre-3.5.28-1.1.mga8
7/core
- djvulibre-3.5.27-5.2.mga7