Mageia 2019-0346: djvulibre security update
Summary
The updated packages fix security vulnerabilities:
In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows
attackers to cause a denial-of-service (application crash in
GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer
over-read) by crafting a DJVU file. (CVE-2019-15142)
In DjVuLibre 3.5.27, the bitmap reader component allows attackers to
cause a denial-of-service error (resource exhaustion caused by a
GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file,
related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp. (CVE-2019-15143)
In DjVuLibre 3.5.27, the sorting functionality (aka
GArrayTemplate
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack
(application crash via an out-of-bounds read) by crafting a corrupted JB2
ima...
References
- https://bugs.mageia.org/show_bug.cgi?id=25730
- https://ubuntu.com/security/notices/USN-4198-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15144
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15145
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804
Resolution
MGASA-2019-0346 - Updated djvulibre packages fix security vulnerabilities
SRPMS
- 7/core/djvulibre-3.5.27-5.1.mga7