OESA-2021-1034

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1034
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2021-1034.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2021-1034
Upstream
Published
2021-02-07T11:02:36Z
Modified
2025-08-12T05:04:22.335945Z
Summary
djvulibre security update
Details

DjVu is a set of compression technologies, a file format, and a software platform for the deliveryover the Web of digital documents, scanned documents, and high resolution images.DjVu documents download and display extremely quickly, and look exactly the same on all platforms with no compatibility problems due to fonts, colors, etc. DjVu can be seen as a superior alternative to PDF and PostScript for digital documents, to TIFF (and PDF) for scanned bitonal documents, to JPEG and JPEG2000 for photographs and pictures, and to GIF for large palettized images. DjVu is the only Web format that is practical for distributing high-resolution scanned documents in color.

Security Fix(es):

DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp.(CVE-2019-18804)

DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::getdirectcontext in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.(CVE-2019-15145)

In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.(CVE-2019-15142)

In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::readrleraw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.(CVE-2019-15143)

In DjVuLibre 3.5.27, the sorting functionality allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.(CVE-2019-15144)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS / djvulibre

Package

Name
djvulibre
Purl
pkg:rpm/openEuler/djvulibre&distro=openEuler-20.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.27-15.oe1

Ecosystem specific

{
    "src": [
        "djvulibre-3.5.27-15.oe1.src.rpm",
        "djvulibre-3.5.27-15.oe1.src.rpm"
    ],
    "x86_64": [
        "djvulibre-devel-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-debugsource-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-debuginfo-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-help-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-devel-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-debugsource-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-debuginfo-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-help-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-3.5.27-15.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "djvulibre-help-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-devel-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-debugsource-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-debuginfo-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-help-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-devel-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-debugsource-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-debuginfo-3.5.27-15.oe1.aarch64.rpm"
    ]
}

openEuler:20.03-LTS-SP1 / djvulibre

Package

Name
djvulibre
Purl
pkg:rpm/openEuler/djvulibre&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.27-15.oe1

Ecosystem specific

{
    "src": [
        "djvulibre-3.5.27-15.oe1.src.rpm"
    ],
    "x86_64": [
        "djvulibre-devel-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-debugsource-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-debuginfo-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-help-3.5.27-15.oe1.x86_64.rpm",
        "djvulibre-3.5.27-15.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "djvulibre-help-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-devel-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-debugsource-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-3.5.27-15.oe1.aarch64.rpm",
        "djvulibre-debuginfo-3.5.27-15.oe1.aarch64.rpm"
    ]
}