Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in djvulibre
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in djvulibre
ID: FEDORA-2021-d4c1c98a58
Distribution: Fedora
Plattformen: Fedora 33
Datum: Di, 11. Mai 2021, 15:54
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500
Applikationen: DjVuLibre

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2021-d4c1c98a58
2021-05-11 01:15:16.743966
-------------------------------------------------------------------------------
-

Name : djvulibre
Product : Fedora 33
Version : 3.5.27
Release : 27.fc33
URL : http://djvu.sourceforge.net/
Summary : DjVu viewers, encoders, and utilities
Description :
DjVu is a web-centric format and software platform for distributing documents
and images. DjVu can advantageously replace PDF, PS, TIFF, JPEG, and GIF for
distributing scanned documents, digital documents, or high-resolution pictures.
DjVu content downloads faster, displays and renders faster, looks nicer on a
screen, and consume less client resources than competing formats. DjVu images
display instantly and can be smoothly zoomed and panned with no lengthy
re-rendering.

DjVuLibre is a free (GPL'ed) implementation of DjVu, including viewers,
decoders, simple encoders, and utilities. The browser plugin is in its own
separate sub-package.

-------------------------------------------------------------------------------
-
Update Information:

This update fixes several issues in djvulibre. These are mostly related to
opening of corrupted files.
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon May 3 2021 Marek Kasik <mkasik@redhat.com> - 3.5.27-27
- Avoid unsigned short overflow in GBitmap when allocating row buffer
- Resolves: #1943424
* Mon May 3 2021 Marek Kasik <mkasik@redhat.com> - 3.5.27-26
- Avoid stack overflow in DjVuPort by remembering which file we are opening
- Resolves: #1943411, #1943685
* Mon May 3 2021 Marek Kasik <mkasik@redhat.com> - 3.5.27-25
- Check input pool for NULL
- Resolves: #1943410
* Mon May 3 2021 Marek Kasik <mkasik@redhat.com> - 3.5.27-24
- Avoid integer overflow when allocating bitmap
- Resolves: #1943409
* Mon May 3 2021 Marek Kasik <mkasik@redhat.com> - 3.5.27-23
- Check image size for 0
- Resolves: #1943408
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1943685 - CVE-2021-3500 djvulibre: Stack overflow in function
DJVU::DjVuDocument::get_djvu_file() via crafted djvu file
https://bugzilla.redhat.com/show_bug.cgi?id=1943685
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-d4c1c98a58' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung