Package "djvulibre"
Name: |
djvulibre
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Transition package, djview3 to djview4
- Transition package, djview3 to djview4
- Utilities for the DjVu image format
- Desktop support for the DjVu image format
|
Latest version: |
3.5.27.1-8ubuntu0.4 |
Release: |
bionic (18.04) |
Level: |
security |
Repository: |
universe |
Links
Other versions of "djvulibre" in Bionic
Packages in group
Deleted packages are displayed in grey.
Changelog
djvulibre (3.5.27.1-8ubuntu0.4) bionic-security; urgency=medium
* SECURITY UPDATE: Out-of-bounds write
- debian/patches/CVE-2021-3630.patch: checks correct buffer size
to use in libdjvu/GString.cpp.
- CVE-2021-3630
-- Leonidas Da Silva Barbosa <email address hidden> Thu, 01 Jul 2021 10:14:09 -0300
|
Source diff to previous version |
CVE-2021-3630 |
An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file which may lead to cras |
|
djvulibre (3.5.27.1-8ubuntu0.3) bionic-security; urgency=medium
* SECURITY UPDATE: Stack overflow
- debian/patches/CVE-2021-3500.patch: prevent recursion in
libdjvu/DjVuPort.cpp, libdjvu/DjVuPort.h.
- CVE-2021-3500
* SECURITY UPDATE: Out of bounds write
- debian/patches/CVE-2021-32490.patch: add checks to
libdjvu/IW44Image.cpp.
- CVE-2021-32490
* SECURITY UPDATE: Integer overflow
- debian/patches/CVE-2021-32491.patch: check for overflow in
tools/ddjvu.cpp.
- CVE-2021-32491
* SECURITY UPDATE: Out of bounds read
- debian/patches/CVE-2021-32492.patch: check pool in
libdjvu/DataPool.cpp.
- CVE-2021-32492
* SECURITY UPDATE: Heap buffer overflow
- debian/patches/CVE-2021-32493.patch: check row size in
libdjvu/GBitmap.cpp.
- CVE-2021-32493
* debian/patches: rename debian-changes to changes.patch to simplify
maintenance.
-- Marc Deslauriers <email address hidden> Mon, 17 May 2021 09:19:55 -0400
|
Source diff to previous version |
djvulibre (3.5.27.1-8ubuntu0.1) bionic-security; urgency=medium
* SECURITY UPDATE: heap-based buffer overread
- debian/patches/CVE-2019-15142-pre1.patch: fix lengths in
libdjvu/DjVmDir.cpp, libdjvu/miniexp.cpp, tools/csepdjvu.cpp.
- debian/patches/CVE-2019-15142.patch: add checks to
libdjvu/DjVmDir.cpp.
- CVE-2019-15142
* SECURITY UPDATE: infinite loop in bitmap reader
- debian/patches/CVE-2019-15143.patch: check return code in
libdjvu/GBitmap.cpp, libdjvu/DjVmDir.cpp.
- CVE-2019-15143
* SECURITY UPDATE: uncontrolled recursion in sorting
- debian/patches/CVE-2019-15144.patch: fix logic in
libdjvu/GContainer.h.
- CVE-2019-15144
* SECURITY UPDATE: out of bounds read
- debian/patches/CVE-2019-15145.patch: check bytes in
libdjvu/GBitmap.h.
- CVE-2019-15145
* SECURITY UPDATE: NULL pointer dereference in DJVU::filter_fv
- debian/patches/CVE-2019-18804.patch: add extra checks to
libdjvu/IW44EncodeCodec.cpp, tools/ddjvu.cpp.
- CVE-2019-18804
-- Marc Deslauriers <email address hidden> Wed, 20 Nov 2019 10:26:08 -0500
|
CVE-2019-15142 |
In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup |
CVE-2019-15143 |
In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_r |
CVE-2019-15144 |
In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate<TYPE>::sort) allows attackers to cause a denial-of-service (application crash due |
CVE-2019-15145 |
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image |
CVE-2019-18804 |
DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp. |
|
About
-
Send Feedback to @ubuntu_updates