{"schema_version":"1.7.2","id":"OESA-2021-1034","modified":"2021-02-07T11:02:36Z","published":"2021-02-07T11:02:36Z","upstream":["CVE-2019-18804","CVE-2019-15145","CVE-2019-15142","CVE-2019-15143","CVE-2019-15144"],"summary":"djvulibre security update","details":"DjVu is a set of compression technologies, a file format, and a software platform for the deliveryover the Web of digital documents, scanned documents, and high resolution images.DjVu documents download and display extremely quickly, and look exactly the same on all platforms with no compatibility problems due to fonts, colors, etc. DjVu can be seen as a superior alternative to PDF and PostScript for digital documents, to TIFF (and PDF) for scanned bitonal documents, to JPEG and JPEG2000 for photographs and pictures, and to GIF for large palettized images. DjVu is the only Web format that is practical for distributing high-resolution scanned documents in color.\n\r\nSecurity Fix(es):\n\r\nDjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp.(CVE-2019-18804)\n\r\nDjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.(CVE-2019-15145)\n\nIn DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.(CVE-2019-15142)\n\nIn DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.(CVE-2019-15143)\n\nIn DjVuLibre 3.5.27, the sorting functionality allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.(CVE-2019-15144)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS","name":"djvulibre","purl":"pkg:rpm/openEuler/djvulibre\u0026distro=openEuler-20.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.5.27-15.oe1"}]}],"ecosystem_specific":{"aarch64":["djvulibre-help-3.5.27-15.oe1.aarch64.rpm","djvulibre-devel-3.5.27-15.oe1.aarch64.rpm","djvulibre-debugsource-3.5.27-15.oe1.aarch64.rpm","djvulibre-3.5.27-15.oe1.aarch64.rpm","djvulibre-debuginfo-3.5.27-15.oe1.aarch64.rpm","djvulibre-help-3.5.27-15.oe1.aarch64.rpm","djvulibre-devel-3.5.27-15.oe1.aarch64.rpm","djvulibre-debugsource-3.5.27-15.oe1.aarch64.rpm","djvulibre-3.5.27-15.oe1.aarch64.rpm","djvulibre-debuginfo-3.5.27-15.oe1.aarch64.rpm"],"src":["djvulibre-3.5.27-15.oe1.src.rpm","djvulibre-3.5.27-15.oe1.src.rpm"],"x86_64":["djvulibre-devel-3.5.27-15.oe1.x86_64.rpm","djvulibre-debugsource-3.5.27-15.oe1.x86_64.rpm","djvulibre-debuginfo-3.5.27-15.oe1.x86_64.rpm","djvulibre-help-3.5.27-15.oe1.x86_64.rpm","djvulibre-3.5.27-15.oe1.x86_64.rpm","djvulibre-devel-3.5.27-15.oe1.x86_64.rpm","djvulibre-debugsource-3.5.27-15.oe1.x86_64.rpm","djvulibre-debuginfo-3.5.27-15.oe1.x86_64.rpm","djvulibre-help-3.5.27-15.oe1.x86_64.rpm","djvulibre-3.5.27-15.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"djvulibre","purl":"pkg:rpm/openEuler/djvulibre\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.5.27-15.oe1"}]}],"ecosystem_specific":{"aarch64":["djvulibre-help-3.5.27-15.oe1.aarch64.rpm","djvulibre-devel-3.5.27-15.oe1.aarch64.rpm","djvulibre-debugsource-3.5.27-15.oe1.aarch64.rpm","djvulibre-3.5.27-15.oe1.aarch64.rpm","djvulibre-debuginfo-3.5.27-15.oe1.aarch64.rpm"],"src":["djvulibre-3.5.27-15.oe1.src.rpm"],"x86_64":["djvulibre-devel-3.5.27-15.oe1.x86_64.rpm","djvulibre-debugsource-3.5.27-15.oe1.x86_64.rpm","djvulibre-debuginfo-3.5.27-15.oe1.x86_64.rpm","djvulibre-help-3.5.27-15.oe1.x86_64.rpm","djvulibre-3.5.27-15.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1034"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18804"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15145"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15142"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15143"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15144"}],"database_specific":{"severity":"High"}}