OESA-2021-1255

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1255
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2021-1255.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2021-1255
Upstream
Published
2021-07-03T11:03:01Z
Modified
2025-08-12T05:08:17.839291Z
Summary
djvulibre security update
Details

DjVu is a set of compression technologies, a file format, and a software platform for the deliveryover the Web of digital documents, scanned documents, and high resolution images.DjVu documents download and display extremely quickly, and look exactly the same on all platforms with no compatibility problems due to fonts, colors, etc. DjVu can be seen as a superior alternative to PDF and PostScript for digital documents, to TIFF (and PDF) for scanned bitonal documents, to JPEG and JPEG2000 for photographs and pictures, and to GIF for large palettized images. DjVu is the only Web format that is practical for distributing high-resolution scanned documents in color.

Security Fix(es):

A flaw was found in djvulibre-3.5.28 and earlier. A Stack overflow in function DJVU::DjVuDocument::getdjvufile() via crafted djvu file may lead to application crash and other consequences.(CVE-2021-3500)

A flaw was found in djvulibre-3.5.28 and earlier. A heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file may lead to application crash and other consequences.(CVE-2021-32493)

A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds write in function DJVU::filter_bv() via crafted djvu file may lead to application crash and other consequences.(CVE-2021-32490)

A flaw was found in djvulibre-3.5.28 and earlier. An integer overflow in function render() in tools/ddjvu via crafted djvu file may lead to application crash and other consequences.(CVE-2021-32491)

A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file may lead to application crash and other consequences.(CVE-2021-32492)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / djvulibre

Package

Name
djvulibre
Purl
pkg:rpm/openEuler/djvulibre&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.27-16.oe1

Ecosystem specific

{
    "src": [
        "djvulibre-3.5.27-16.oe1.src.rpm"
    ],
    "x86_64": [
        "djvulibre-debuginfo-3.5.27-16.oe1.x86_64.rpm",
        "djvulibre-devel-3.5.27-16.oe1.x86_64.rpm",
        "djvulibre-3.5.27-16.oe1.x86_64.rpm",
        "djvulibre-help-3.5.27-16.oe1.x86_64.rpm",
        "djvulibre-debugsource-3.5.27-16.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "djvulibre-help-3.5.27-16.oe1.aarch64.rpm",
        "djvulibre-3.5.27-16.oe1.aarch64.rpm",
        "djvulibre-debuginfo-3.5.27-16.oe1.aarch64.rpm",
        "djvulibre-debugsource-3.5.27-16.oe1.aarch64.rpm",
        "djvulibre-devel-3.5.27-16.oe1.aarch64.rpm"
    ]
}