MGASA-2019-0346

Source
https://advisories.mageia.org/MGASA-2019-0346.html
Import Source
https://advisories.mageia.org/MGASA-2019-0346.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2019-0346
Related
Published
2019-11-30T13:06:06Z
Modified
2019-11-30T12:39:39Z
Summary
Updated djvulibre packages fix security vulnerabilities
Details

The updated packages fix security vulnerabilities:

In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file. (CVE-2019-15142)

In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::readrleraw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp. (CVE-2019-15143)

In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate<TYPE>::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h. (CVE-2019-15144)

DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::getdirectcontext in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h. (CVE-2019-15145)

DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp. (CVE-2019-18804)

References
Credits

Affected packages

Mageia:7 / djvulibre

Package

Name
djvulibre
Purl
pkg:rpm/mageia/djvulibre?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.27-5.1.mga7

Ecosystem specific

{
    "section": "core"
}