{"id":"MGASA-2019-0346","summary":"Updated djvulibre packages fix security vulnerabilities","details":"The updated packages fix security vulnerabilities:\n\nIn DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows\nattackers to cause a denial-of-service (application crash in\nGStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer\nover-read) by crafting a DJVU file. (CVE-2019-15142)\n\nIn DjVuLibre 3.5.27, the bitmap reader component allows attackers to\ncause a denial-of-service error (resource exhaustion caused by a\nGBitmap::read_rle_raw infinite loop) by crafting a corrupted image file,\nrelated to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp. (CVE-2019-15143)\n\nIn DjVuLibre 3.5.27, the sorting functionality (aka \nGArrayTemplate\u003cTYPE\u003e::sort) allows attackers to cause a denial-of-service\n(application crash due to an Uncontrolled Recursion) by crafting a PBM\nimage file that is mishandled in libdjvu/GContainer.h. (CVE-2019-15144)\n\nDjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack\n(application crash via an out-of-bounds read) by crafting a corrupted JB2\nimage file that is mishandled in JB2Dict::JB2Codec::get_direct_context in\nlibdjvu/JB2Image.h because of a missing zero-bytes check in\nlibdjvu/GBitmap.h. (CVE-2019-15145)\n\nDjVuLibre 3.5.27 has a NULL pointer dereference in the function \nDJVU::filter_fv at IW44EncodeCodec.cpp. (CVE-2019-18804)\n","modified":"2026-02-02T08:33:21.913369Z","published":"2019-11-30T13:06:06Z","related":["CVE-2019-15142","CVE-2019-15143","CVE-2019-15144","CVE-2019-15145","CVE-2019-18804"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2019-0346.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=25730"},{"type":"REPORT","url":"https://usn.ubuntu.com/4198-1/"}],"affected":[{"package":{"name":"djvulibre","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/djvulibre?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.5.27-5.1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2019-0346.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}