Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-15145 (GCVE-0-2019-15145)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:42:03.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sourceforge.net/p/djvu/bugs/298/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/" }, { "name": "[debian-lts-announce] 20190829 [SECURITY] [DLA 1902-1] djvulibre security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html" }, { "name": "openSUSE-SU-2019:2217", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" }, { "name": "openSUSE-SU-2019:2219", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" }, { "name": "FEDORA-2019-67ff247aea", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/" }, { "name": "FEDORA-2019-b217f90c2a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/" }, { "name": "FEDORA-2019-7ca378f076", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/" }, { "name": "USN-4198-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4198-1/" }, { "name": "FEDORA-2019-f923712bab", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/" }, { "name": "FEDORA-2019-6bc8be9d84", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/" }, { "name": "GLSA-202007-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-36" }, { "name": "[debian-lts-announce] 20210526 [SECURITY] [DLA 2667-1] djvulibre security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html" }, { "name": "DSA-5032", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-5032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-28T22:06:34", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://sourceforge.net/p/djvu/bugs/298/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/" }, { "name": "[debian-lts-announce] 20190829 [SECURITY] [DLA 1902-1] djvulibre security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html" }, { "name": "openSUSE-SU-2019:2217", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" }, { "name": "openSUSE-SU-2019:2219", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" }, { "name": "FEDORA-2019-67ff247aea", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/" }, { "name": "FEDORA-2019-b217f90c2a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/" }, { "name": "FEDORA-2019-7ca378f076", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/" }, { "name": "USN-4198-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4198-1/" }, { "name": "FEDORA-2019-f923712bab", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/" }, { "name": "FEDORA-2019-6bc8be9d84", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/" }, { "name": "GLSA-202007-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202007-36" }, { "name": "[debian-lts-announce] 20210526 [SECURITY] [DLA 2667-1] djvulibre security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html" }, { "name": "DSA-5032", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-5032" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15145", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://sourceforge.net/p/djvu/bugs/298/", "refsource": "MISC", "url": "https://sourceforge.net/p/djvu/bugs/298/" }, { "name": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/", "refsource": "MISC", "url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/" }, { "name": "[debian-lts-announce] 20190829 [SECURITY] [DLA 1902-1] djvulibre security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html" }, { "name": "openSUSE-SU-2019:2217", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" }, { "name": "openSUSE-SU-2019:2219", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" }, { "name": "FEDORA-2019-67ff247aea", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/" }, { "name": "FEDORA-2019-b217f90c2a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/" }, { "name": "FEDORA-2019-7ca378f076", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/" }, { "name": "USN-4198-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4198-1/" }, { "name": "FEDORA-2019-f923712bab", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/" }, { "name": "FEDORA-2019-6bc8be9d84", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/" }, { "name": "GLSA-202007-36", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202007-36" }, { "name": "[debian-lts-announce] 20210526 [SECURITY] [DLA 2667-1] djvulibre security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html" }, { "name": "DSA-5032", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-5032" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15145", "datePublished": "2019-08-18T18:30:05", "dateReserved": "2019-08-18T00:00:00", "dateUpdated": "2024-08-05T00:42:03.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-15145\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-08-18T19:15:10.387\",\"lastModified\":\"2024-11-21T04:28:09.390\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.\"},{\"lang\":\"es\",\"value\":\"DjVuLibre versi\u00f3n 3.5.27, permite a atacantes causar un ataque de denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n por medio de una lectura fuera de l\u00edmites) mediante el dise\u00f1o de un archivo de imagen JB2 corrupto que es manejado inapropiadamente en la funci\u00f3n JB2Dict::JB2Codec::get_direct_context en el archivo libdjvu/JB2Image.h debido a una falta de comprobaci\u00f3n de cero bytes en el archivo libdjvu/GBitmap.h.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:djvulibre_project:djvulibre:3.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6174AF9B-0B0B-4602-A693-A775A541276B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A31C8344-3E02-4EB8-8BD8-4C84B7959624\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202007-36\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sourceforge.net/p/djvu/bugs/298/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4198-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-5032\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202007-36\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sourceforge.net/p/djvu/bugs/298/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4198-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-5032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
opensuse-su-2019:2217-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for djvulibre", "title": "Title of the patch" }, { "category": "description", "text": "This update for djvulibre fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).\n- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).\n- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).\n- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).\n- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2217", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2217-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2217-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IH4MQKYJLC6RE2GZDHVFRWARHBFRQAP4/#IH4MQKYJLC6RE2GZDHVFRWARHBFRQAP4" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2217-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IH4MQKYJLC6RE2GZDHVFRWARHBFRQAP4/#IH4MQKYJLC6RE2GZDHVFRWARHBFRQAP4" }, { "category": "self", "summary": "SUSE Bug 1146569", "url": "https://bugzilla.suse.com/1146569" }, { "category": "self", "summary": "SUSE Bug 1146571", "url": "https://bugzilla.suse.com/1146571" }, { "category": "self", "summary": "SUSE Bug 1146572", "url": "https://bugzilla.suse.com/1146572" }, { "category": "self", "summary": "SUSE Bug 1146702", "url": "https://bugzilla.suse.com/1146702" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15142 page", "url": "https://www.suse.com/security/cve/CVE-2019-15142/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15143 page", "url": "https://www.suse.com/security/cve/CVE-2019-15143/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15144 page", "url": "https://www.suse.com/security/cve/CVE-2019-15144/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15145 page", "url": "https://www.suse.com/security/cve/CVE-2019-15145/" } ], "title": "Security update for djvulibre", "tracking": { "current_release_date": "2019-09-30T04:19:41Z", "generator": { "date": "2019-09-30T04:19:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2217-1", "initial_release_date": "2019-09-30T04:19:41Z", "revision_history": [ { "date": "2019-09-30T04:19:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.27-lp150.2.3.1.i586", "product": { "name": "djvulibre-3.5.27-lp150.2.3.1.i586", "product_id": "djvulibre-3.5.27-lp150.2.3.1.i586" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.27-lp150.2.3.1.i586", "product": { "name": "djvulibre-doc-3.5.27-lp150.2.3.1.i586", "product_id": "djvulibre-doc-3.5.27-lp150.2.3.1.i586" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "product": { "name": "libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "product_id": "libdjvulibre-devel-3.5.27-lp150.2.3.1.i586" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.27-lp150.2.3.1.i586", "product": { "name": "libdjvulibre21-3.5.27-lp150.2.3.1.i586", "product_id": "libdjvulibre21-3.5.27-lp150.2.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.27-lp150.2.3.1.x86_64", "product": { "name": "djvulibre-3.5.27-lp150.2.3.1.x86_64", "product_id": "djvulibre-3.5.27-lp150.2.3.1.x86_64" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "product": { "name": "djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "product_id": "djvulibre-doc-3.5.27-lp150.2.3.1.x86_64" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "product": { "name": "libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "product_id": "libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.27-lp150.2.3.1.x86_64", "product": { "name": "libdjvulibre21-3.5.27-lp150.2.3.1.x86_64", "product_id": "libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "djvulibre-3.5.27-lp150.2.3.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586" }, "product_reference": "djvulibre-3.5.27-lp150.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-3.5.27-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64" }, "product_reference": "djvulibre-3.5.27-lp150.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-doc-3.5.27-lp150.2.3.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586" }, "product_reference": "djvulibre-doc-3.5.27-lp150.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-doc-3.5.27-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64" }, "product_reference": "djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.27-lp150.2.3.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586" }, "product_reference": "libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64" }, "product_reference": "libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.27-lp150.2.3.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586" }, "product_reference": "libdjvulibre21-3.5.27-lp150.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.27-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" }, "product_reference": "libdjvulibre21-3.5.27-lp150.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-15142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15142" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15142", "url": "https://www.suse.com/security/cve/CVE-2019-15142" }, { "category": "external", "summary": "SUSE Bug 1146702 for CVE-2019-15142", "url": "https://bugzilla.suse.com/1146702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-30T04:19:41Z", "details": "moderate" } ], "title": "CVE-2019-15142" }, { "cve": "CVE-2019-15143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15143" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15143", "url": "https://www.suse.com/security/cve/CVE-2019-15143" }, { "category": "external", "summary": "SUSE Bug 1146569 for CVE-2019-15143", "url": "https://bugzilla.suse.com/1146569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-30T04:19:41Z", "details": "moderate" } ], "title": "CVE-2019-15143" }, { "cve": "CVE-2019-15144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15144" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate\u003cTYPE\u003e::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15144", "url": "https://www.suse.com/security/cve/CVE-2019-15144" }, { "category": "external", "summary": "SUSE Bug 1146571 for CVE-2019-15144", "url": "https://bugzilla.suse.com/1146571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-30T04:19:41Z", "details": "moderate" } ], "title": "CVE-2019-15144" }, { "cve": "CVE-2019-15145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15145" } ], "notes": [ { "category": "general", "text": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15145", "url": "https://www.suse.com/security/cve/CVE-2019-15145" }, { "category": "external", "summary": "SUSE Bug 1146572 for CVE-2019-15145", "url": "https://bugzilla.suse.com/1146572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586", "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-30T04:19:41Z", "details": "moderate" } ], "title": "CVE-2019-15145" } ] }
opensuse-su-2019:2219-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for djvulibre", "title": "Title of the patch" }, { "category": "description", "text": "This update for djvulibre fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).\n- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).\n- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).\n- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).\n- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2219", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2219-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2219-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2F2PNQ46QIVPZMNWBDFGGMLWSIMKM2DB/#2F2PNQ46QIVPZMNWBDFGGMLWSIMKM2DB" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2219-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2F2PNQ46QIVPZMNWBDFGGMLWSIMKM2DB/#2F2PNQ46QIVPZMNWBDFGGMLWSIMKM2DB" }, { "category": "self", "summary": "SUSE Bug 1146569", "url": "https://bugzilla.suse.com/1146569" }, { "category": "self", "summary": "SUSE Bug 1146571", "url": "https://bugzilla.suse.com/1146571" }, { "category": "self", "summary": "SUSE Bug 1146572", "url": "https://bugzilla.suse.com/1146572" }, { "category": "self", "summary": "SUSE Bug 1146702", "url": "https://bugzilla.suse.com/1146702" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15142 page", "url": "https://www.suse.com/security/cve/CVE-2019-15142/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15143 page", "url": "https://www.suse.com/security/cve/CVE-2019-15143/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15144 page", "url": "https://www.suse.com/security/cve/CVE-2019-15144/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15145 page", "url": "https://www.suse.com/security/cve/CVE-2019-15145/" } ], "title": "Security update for djvulibre", "tracking": { "current_release_date": "2019-09-30T10:20:29Z", "generator": { "date": "2019-09-30T10:20:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2219-1", "initial_release_date": "2019-09-30T10:20:29Z", "revision_history": [ { "date": "2019-09-30T10:20:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.27-lp151.3.3.1.i586", "product": { "name": "djvulibre-3.5.27-lp151.3.3.1.i586", "product_id": "djvulibre-3.5.27-lp151.3.3.1.i586" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.27-lp151.3.3.1.i586", "product": { "name": "djvulibre-doc-3.5.27-lp151.3.3.1.i586", "product_id": "djvulibre-doc-3.5.27-lp151.3.3.1.i586" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "product": { "name": "libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "product_id": "libdjvulibre-devel-3.5.27-lp151.3.3.1.i586" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.27-lp151.3.3.1.i586", "product": { "name": "libdjvulibre21-3.5.27-lp151.3.3.1.i586", "product_id": "libdjvulibre21-3.5.27-lp151.3.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.27-lp151.3.3.1.x86_64", "product": { "name": "djvulibre-3.5.27-lp151.3.3.1.x86_64", "product_id": "djvulibre-3.5.27-lp151.3.3.1.x86_64" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "product": { "name": "djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "product_id": "djvulibre-doc-3.5.27-lp151.3.3.1.x86_64" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "product": { "name": "libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "product_id": "libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.27-lp151.3.3.1.x86_64", "product": { "name": "libdjvulibre21-3.5.27-lp151.3.3.1.x86_64", "product_id": "libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "djvulibre-3.5.27-lp151.3.3.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586" }, "product_reference": "djvulibre-3.5.27-lp151.3.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-3.5.27-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64" }, "product_reference": "djvulibre-3.5.27-lp151.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-doc-3.5.27-lp151.3.3.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586" }, "product_reference": "djvulibre-doc-3.5.27-lp151.3.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-doc-3.5.27-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64" }, "product_reference": "djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.27-lp151.3.3.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586" }, "product_reference": "libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64" }, "product_reference": "libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.27-lp151.3.3.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586" }, "product_reference": "libdjvulibre21-3.5.27-lp151.3.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.27-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" }, "product_reference": "libdjvulibre21-3.5.27-lp151.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-15142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15142" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15142", "url": "https://www.suse.com/security/cve/CVE-2019-15142" }, { "category": "external", "summary": "SUSE Bug 1146702 for CVE-2019-15142", "url": "https://bugzilla.suse.com/1146702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-30T10:20:29Z", "details": "moderate" } ], "title": "CVE-2019-15142" }, { "cve": "CVE-2019-15143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15143" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15143", "url": "https://www.suse.com/security/cve/CVE-2019-15143" }, { "category": "external", "summary": "SUSE Bug 1146569 for CVE-2019-15143", "url": "https://bugzilla.suse.com/1146569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-30T10:20:29Z", "details": "moderate" } ], "title": "CVE-2019-15143" }, { "cve": "CVE-2019-15144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15144" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate\u003cTYPE\u003e::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15144", "url": "https://www.suse.com/security/cve/CVE-2019-15144" }, { "category": "external", "summary": "SUSE Bug 1146571 for CVE-2019-15144", "url": "https://bugzilla.suse.com/1146571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-30T10:20:29Z", "details": "moderate" } ], "title": "CVE-2019-15144" }, { "cve": "CVE-2019-15145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15145" } ], "notes": [ { "category": "general", "text": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15145", "url": "https://www.suse.com/security/cve/CVE-2019-15145" }, { "category": "external", "summary": "SUSE Bug 1146572 for CVE-2019-15145", "url": "https://bugzilla.suse.com/1146572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586", "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-30T10:20:29Z", "details": "moderate" } ], "title": "CVE-2019-15145" } ] }
opensuse-su-2024:10719-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "djvulibre-3.5.28-3.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the djvulibre-3.5.28-3.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10719", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10719-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15142 page", "url": "https://www.suse.com/security/cve/CVE-2019-15142/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15143 page", "url": "https://www.suse.com/security/cve/CVE-2019-15143/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15144 page", "url": "https://www.suse.com/security/cve/CVE-2019-15144/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15145 page", "url": "https://www.suse.com/security/cve/CVE-2019-15145/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18804 page", "url": "https://www.suse.com/security/cve/CVE-2019-18804/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32490 page", "url": "https://www.suse.com/security/cve/CVE-2021-32490/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32491 page", "url": "https://www.suse.com/security/cve/CVE-2021-32491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32492 page", "url": "https://www.suse.com/security/cve/CVE-2021-32492/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32493 page", "url": "https://www.suse.com/security/cve/CVE-2021-32493/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3500 page", "url": "https://www.suse.com/security/cve/CVE-2021-3500/" } ], "title": "djvulibre-3.5.28-3.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10719-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.28-3.2.aarch64", "product": { "name": "djvulibre-3.5.28-3.2.aarch64", "product_id": "djvulibre-3.5.28-3.2.aarch64" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.28-3.2.aarch64", "product": { "name": "djvulibre-doc-3.5.28-3.2.aarch64", "product_id": "djvulibre-doc-3.5.28-3.2.aarch64" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.28-3.2.aarch64", "product": { "name": "libdjvulibre-devel-3.5.28-3.2.aarch64", "product_id": "libdjvulibre-devel-3.5.28-3.2.aarch64" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.28-3.2.aarch64", "product": { "name": "libdjvulibre21-3.5.28-3.2.aarch64", "product_id": "libdjvulibre21-3.5.28-3.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.28-3.2.ppc64le", "product": { "name": "djvulibre-3.5.28-3.2.ppc64le", "product_id": "djvulibre-3.5.28-3.2.ppc64le" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.28-3.2.ppc64le", "product": { "name": "djvulibre-doc-3.5.28-3.2.ppc64le", "product_id": "djvulibre-doc-3.5.28-3.2.ppc64le" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.28-3.2.ppc64le", "product": { "name": "libdjvulibre-devel-3.5.28-3.2.ppc64le", "product_id": "libdjvulibre-devel-3.5.28-3.2.ppc64le" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.28-3.2.ppc64le", "product": { "name": "libdjvulibre21-3.5.28-3.2.ppc64le", "product_id": "libdjvulibre21-3.5.28-3.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.28-3.2.s390x", "product": { "name": "djvulibre-3.5.28-3.2.s390x", "product_id": "djvulibre-3.5.28-3.2.s390x" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.28-3.2.s390x", "product": { "name": "djvulibre-doc-3.5.28-3.2.s390x", "product_id": "djvulibre-doc-3.5.28-3.2.s390x" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.28-3.2.s390x", "product": { "name": "libdjvulibre-devel-3.5.28-3.2.s390x", "product_id": "libdjvulibre-devel-3.5.28-3.2.s390x" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.28-3.2.s390x", "product": { "name": "libdjvulibre21-3.5.28-3.2.s390x", "product_id": "libdjvulibre21-3.5.28-3.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.28-3.2.x86_64", "product": { "name": "djvulibre-3.5.28-3.2.x86_64", "product_id": "djvulibre-3.5.28-3.2.x86_64" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.28-3.2.x86_64", "product": { "name": "djvulibre-doc-3.5.28-3.2.x86_64", "product_id": "djvulibre-doc-3.5.28-3.2.x86_64" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.28-3.2.x86_64", "product": { "name": "libdjvulibre-devel-3.5.28-3.2.x86_64", "product_id": "libdjvulibre-devel-3.5.28-3.2.x86_64" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.28-3.2.x86_64", "product": { "name": "libdjvulibre21-3.5.28-3.2.x86_64", "product_id": "libdjvulibre21-3.5.28-3.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "djvulibre-3.5.28-3.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64" }, "product_reference": "djvulibre-3.5.28-3.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-3.5.28-3.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le" }, "product_reference": "djvulibre-3.5.28-3.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-3.5.28-3.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x" }, "product_reference": "djvulibre-3.5.28-3.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-3.5.28-3.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64" }, "product_reference": "djvulibre-3.5.28-3.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-doc-3.5.28-3.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64" }, "product_reference": "djvulibre-doc-3.5.28-3.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-doc-3.5.28-3.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le" }, "product_reference": "djvulibre-doc-3.5.28-3.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-doc-3.5.28-3.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x" }, "product_reference": "djvulibre-doc-3.5.28-3.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-doc-3.5.28-3.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64" }, "product_reference": "djvulibre-doc-3.5.28-3.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.28-3.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64" }, "product_reference": "libdjvulibre-devel-3.5.28-3.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.28-3.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le" }, "product_reference": "libdjvulibre-devel-3.5.28-3.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.28-3.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x" }, "product_reference": "libdjvulibre-devel-3.5.28-3.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.28-3.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64" }, "product_reference": "libdjvulibre-devel-3.5.28-3.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.28-3.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64" }, "product_reference": "libdjvulibre21-3.5.28-3.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.28-3.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le" }, "product_reference": "libdjvulibre21-3.5.28-3.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.28-3.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x" }, "product_reference": "libdjvulibre21-3.5.28-3.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.28-3.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" }, "product_reference": "libdjvulibre21-3.5.28-3.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-15142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15142" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15142", "url": "https://www.suse.com/security/cve/CVE-2019-15142" }, { "category": "external", "summary": "SUSE Bug 1146702 for CVE-2019-15142", "url": "https://bugzilla.suse.com/1146702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15142" }, { "cve": "CVE-2019-15143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15143" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15143", "url": "https://www.suse.com/security/cve/CVE-2019-15143" }, { "category": "external", "summary": "SUSE Bug 1146569 for CVE-2019-15143", "url": "https://bugzilla.suse.com/1146569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15143" }, { "cve": "CVE-2019-15144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15144" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate\u003cTYPE\u003e::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15144", "url": "https://www.suse.com/security/cve/CVE-2019-15144" }, { "category": "external", "summary": "SUSE Bug 1146571 for CVE-2019-15144", "url": "https://bugzilla.suse.com/1146571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15144" }, { "cve": "CVE-2019-15145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15145" } ], "notes": [ { "category": "general", "text": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15145", "url": "https://www.suse.com/security/cve/CVE-2019-15145" }, { "category": "external", "summary": "SUSE Bug 1146572 for CVE-2019-15145", "url": "https://bugzilla.suse.com/1146572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15145" }, { "cve": "CVE-2019-18804", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18804" } ], "notes": [ { "category": "general", "text": "DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18804", "url": "https://www.suse.com/security/cve/CVE-2019-18804" }, { "category": "external", "summary": "SUSE Bug 1156188 for CVE-2019-18804", "url": "https://bugzilla.suse.com/1156188" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-18804" }, { "cve": "CVE-2021-32490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32490" } ], "notes": [ { "category": "general", "text": "A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds write in function DJVU::filter_bv() via crafted djvu file may lead to application crash and other consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32490", "url": "https://www.suse.com/security/cve/CVE-2021-32490" }, { "category": "external", "summary": "SUSE Bug 1185895 for CVE-2021-32490", "url": "https://bugzilla.suse.com/1185895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32490" }, { "cve": "CVE-2021-32491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32491" } ], "notes": [ { "category": "general", "text": "A flaw was found in djvulibre-3.5.28 and earlier. An integer overflow in function render() in tools/ddjvu via crafted djvu file may lead to application crash and other consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32491", "url": "https://www.suse.com/security/cve/CVE-2021-32491" }, { "category": "external", "summary": "SUSE Bug 1185900 for CVE-2021-32491", "url": "https://bugzilla.suse.com/1185900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32491" }, { "cve": "CVE-2021-32492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32492" } ], "notes": [ { "category": "general", "text": "A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file may lead to application crash and other consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32492", "url": "https://www.suse.com/security/cve/CVE-2021-32492" }, { "category": "external", "summary": "SUSE Bug 1185904 for CVE-2021-32492", "url": "https://bugzilla.suse.com/1185904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32492" }, { "cve": "CVE-2021-32493", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32493" } ], "notes": [ { "category": "general", "text": "A flaw was found in djvulibre-3.5.28 and earlier. A heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file may lead to application crash and other consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32493", "url": "https://www.suse.com/security/cve/CVE-2021-32493" }, { "category": "external", "summary": "SUSE Bug 1185905 for CVE-2021-32493", "url": "https://bugzilla.suse.com/1185905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32493" }, { "cve": "CVE-2021-3500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3500" } ], "notes": [ { "category": "general", "text": "A flaw was found in djvulibre-3.5.28 and earlier. A Stack overflow in function DJVU::DjVuDocument::get_djvu_file() via crafted djvu file may lead to application crash and other consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3500", "url": "https://www.suse.com/security/cve/CVE-2021-3500" }, { "category": "external", "summary": "SUSE Bug 1186253 for CVE-2021-3500", "url": "https://bugzilla.suse.com/1186253" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x", "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x", "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3500" } ] }
fkie_cve-2019-15145
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
djvulibre_project | djvulibre | 3.5.27 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
fedoraproject | fedora | 29 | |
fedoraproject | fedora | 30 | |
fedoraproject | fedora | 31 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.04 | |
canonical | ubuntu_linux | 19.10 | |
opensuse | leap | 15.0 | |
opensuse | leap | 15.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.27:*:*:*:*:*:*:*", "matchCriteriaId": "6174AF9B-0B0B-4602-A693-A775A541276B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h." }, { "lang": "es", "value": "DjVuLibre versi\u00f3n 3.5.27, permite a atacantes causar un ataque de denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n por medio de una lectura fuera de l\u00edmites) mediante el dise\u00f1o de un archivo de imagen JB2 corrupto que es manejado inapropiadamente en la funci\u00f3n JB2Dict::JB2Codec::get_direct_context en el archivo libdjvu/JB2Image.h debido a una falta de comprobaci\u00f3n de cero bytes en el archivo libdjvu/GBitmap.h." } ], "id": "CVE-2019-15145", "lastModified": "2024-11-21T04:28:09.390", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-18T19:15:10.387", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-36" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sourceforge.net/p/djvu/bugs/298/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4198-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-5032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sourceforge.net/p/djvu/bugs/298/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4198-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-5032" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2019:2452-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for djvulibre", "title": "Title of the patch" }, { "category": "description", "text": "This update for djvulibre fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).\n- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).\n- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).\n- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).\n- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2452,SUSE-SLE-Module-Desktop-Applications-15-2019-2452,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2452,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2452,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2452,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2452", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2452-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2452-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192452-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2452-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005960.html" }, { "category": "self", "summary": "SUSE Bug 1146569", "url": "https://bugzilla.suse.com/1146569" }, { "category": "self", "summary": "SUSE Bug 1146571", "url": "https://bugzilla.suse.com/1146571" }, { "category": "self", "summary": "SUSE Bug 1146572", "url": "https://bugzilla.suse.com/1146572" }, { "category": "self", "summary": "SUSE Bug 1146702", "url": "https://bugzilla.suse.com/1146702" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15142 page", "url": "https://www.suse.com/security/cve/CVE-2019-15142/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15143 page", "url": "https://www.suse.com/security/cve/CVE-2019-15143/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15144 page", "url": "https://www.suse.com/security/cve/CVE-2019-15144/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15145 page", "url": "https://www.suse.com/security/cve/CVE-2019-15145/" } ], "title": "Security update for djvulibre", "tracking": { "current_release_date": "2019-09-24T14:45:53Z", "generator": { "date": "2019-09-24T14:45:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2452-1", "initial_release_date": "2019-09-24T14:45:53Z", "revision_history": [ { "date": "2019-09-24T14:45:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.27-3.3.1.aarch64", "product": { "name": "djvulibre-3.5.27-3.3.1.aarch64", "product_id": "djvulibre-3.5.27-3.3.1.aarch64" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.27-3.3.1.aarch64", "product": { "name": "djvulibre-doc-3.5.27-3.3.1.aarch64", "product_id": "djvulibre-doc-3.5.27-3.3.1.aarch64" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.27-3.3.1.aarch64", "product": { "name": "libdjvulibre-devel-3.5.27-3.3.1.aarch64", "product_id": "libdjvulibre-devel-3.5.27-3.3.1.aarch64" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.27-3.3.1.aarch64", "product": { "name": "libdjvulibre21-3.5.27-3.3.1.aarch64", "product_id": "libdjvulibre21-3.5.27-3.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.27-3.3.1.i586", "product": { "name": "djvulibre-3.5.27-3.3.1.i586", "product_id": "djvulibre-3.5.27-3.3.1.i586" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.27-3.3.1.i586", "product": { "name": "djvulibre-doc-3.5.27-3.3.1.i586", "product_id": "djvulibre-doc-3.5.27-3.3.1.i586" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.27-3.3.1.i586", "product": { "name": "libdjvulibre-devel-3.5.27-3.3.1.i586", "product_id": "libdjvulibre-devel-3.5.27-3.3.1.i586" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.27-3.3.1.i586", "product": { "name": "libdjvulibre21-3.5.27-3.3.1.i586", "product_id": "libdjvulibre21-3.5.27-3.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.27-3.3.1.ppc64le", "product": { "name": "djvulibre-3.5.27-3.3.1.ppc64le", "product_id": "djvulibre-3.5.27-3.3.1.ppc64le" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.27-3.3.1.ppc64le", "product": { "name": "djvulibre-doc-3.5.27-3.3.1.ppc64le", "product_id": "djvulibre-doc-3.5.27-3.3.1.ppc64le" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "product": { "name": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "product_id": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.27-3.3.1.ppc64le", "product": { "name": "libdjvulibre21-3.5.27-3.3.1.ppc64le", "product_id": "libdjvulibre21-3.5.27-3.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.27-3.3.1.s390x", "product": { "name": "djvulibre-3.5.27-3.3.1.s390x", "product_id": "djvulibre-3.5.27-3.3.1.s390x" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.27-3.3.1.s390x", "product": { "name": "djvulibre-doc-3.5.27-3.3.1.s390x", "product_id": "djvulibre-doc-3.5.27-3.3.1.s390x" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.27-3.3.1.s390x", "product": { "name": "libdjvulibre-devel-3.5.27-3.3.1.s390x", "product_id": "libdjvulibre-devel-3.5.27-3.3.1.s390x" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.27-3.3.1.s390x", "product": { "name": "libdjvulibre21-3.5.27-3.3.1.s390x", "product_id": "libdjvulibre21-3.5.27-3.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.27-3.3.1.x86_64", "product": { "name": "djvulibre-3.5.27-3.3.1.x86_64", "product_id": "djvulibre-3.5.27-3.3.1.x86_64" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.27-3.3.1.x86_64", "product": { "name": "djvulibre-doc-3.5.27-3.3.1.x86_64", "product_id": "djvulibre-doc-3.5.27-3.3.1.x86_64" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.27-3.3.1.x86_64", "product": { "name": "libdjvulibre-devel-3.5.27-3.3.1.x86_64", "product_id": "libdjvulibre-devel-3.5.27-3.3.1.x86_64" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.27-3.3.1.x86_64", "product": { "name": "libdjvulibre21-3.5.27-3.3.1.x86_64", "product_id": "libdjvulibre21-3.5.27-3.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Desktop Applications 15", "product": { "name": "SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-desktop-applications:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15", "product_id": "SUSE Linux Enterprise Module for Package Hub 15", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.27-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64" }, "product_reference": "libdjvulibre-devel-3.5.27-3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le" }, "product_reference": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.27-3.3.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x" }, "product_reference": "libdjvulibre-devel-3.5.27-3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.27-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64" }, "product_reference": "libdjvulibre-devel-3.5.27-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.27-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64" }, "product_reference": "libdjvulibre21-3.5.27-3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.27-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le" }, "product_reference": "libdjvulibre21-3.5.27-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.27-3.3.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x" }, "product_reference": "libdjvulibre21-3.5.27-3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.27-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64" }, "product_reference": "libdjvulibre21-3.5.27-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.27-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64" }, "product_reference": "libdjvulibre-devel-3.5.27-3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le" }, "product_reference": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.27-3.3.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x" }, "product_reference": "libdjvulibre-devel-3.5.27-3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.27-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64" }, "product_reference": "libdjvulibre-devel-3.5.27-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.27-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64" }, "product_reference": "libdjvulibre21-3.5.27-3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.27-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le" }, "product_reference": "libdjvulibre21-3.5.27-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.27-3.3.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x" }, "product_reference": "libdjvulibre21-3.5.27-3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.27-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64" }, "product_reference": "libdjvulibre21-3.5.27-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-3.5.27-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15", "product_id": "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64" }, "product_reference": "djvulibre-3.5.27-3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-3.5.27-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15", "product_id": "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le" }, "product_reference": "djvulibre-3.5.27-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-3.5.27-3.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15", "product_id": "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x" }, "product_reference": "djvulibre-3.5.27-3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "djvulibre-3.5.27-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15", "product_id": "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" }, "product_reference": "djvulibre-3.5.27-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-15142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15142" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15142", "url": "https://www.suse.com/security/cve/CVE-2019-15142" }, { "category": "external", "summary": "SUSE Bug 1146702 for CVE-2019-15142", "url": "https://bugzilla.suse.com/1146702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T14:45:53Z", "details": "moderate" } ], "title": "CVE-2019-15142" }, { "cve": "CVE-2019-15143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15143" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15143", "url": "https://www.suse.com/security/cve/CVE-2019-15143" }, { "category": "external", "summary": "SUSE Bug 1146569 for CVE-2019-15143", "url": "https://bugzilla.suse.com/1146569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T14:45:53Z", "details": "moderate" } ], "title": "CVE-2019-15143" }, { "cve": "CVE-2019-15144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15144" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate\u003cTYPE\u003e::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15144", "url": "https://www.suse.com/security/cve/CVE-2019-15144" }, { "category": "external", "summary": "SUSE Bug 1146571 for CVE-2019-15144", "url": "https://bugzilla.suse.com/1146571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T14:45:53Z", "details": "moderate" } ], "title": "CVE-2019-15144" }, { "cve": "CVE-2019-15145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15145" } ], "notes": [ { "category": "general", "text": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15145", "url": "https://www.suse.com/security/cve/CVE-2019-15145" }, { "category": "external", "summary": "SUSE Bug 1146572 for CVE-2019-15145", "url": "https://bugzilla.suse.com/1146572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T14:45:53Z", "details": "moderate" } ], "title": "CVE-2019-15145" } ] }
suse-su-2019:2444-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for djvulibre", "title": "Title of the patch" }, { "category": "description", "text": "This update for djvulibre fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).\n- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).\n- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).\n- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).\n- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2444,SUSE-SLE-DESKTOP-12-SP4-2019-2444,SUSE-SLE-SDK-12-SP4-2019-2444,SUSE-SLE-SERVER-12-SP4-2019-2444", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2444-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2444-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192444-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2444-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005957.html" }, { "category": "self", "summary": "SUSE Bug 1146569", "url": "https://bugzilla.suse.com/1146569" }, { "category": "self", "summary": "SUSE Bug 1146571", "url": "https://bugzilla.suse.com/1146571" }, { "category": "self", "summary": "SUSE Bug 1146572", "url": "https://bugzilla.suse.com/1146572" }, { "category": "self", "summary": "SUSE Bug 1146702", "url": "https://bugzilla.suse.com/1146702" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15142 page", "url": "https://www.suse.com/security/cve/CVE-2019-15142/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15143 page", "url": "https://www.suse.com/security/cve/CVE-2019-15143/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15144 page", "url": "https://www.suse.com/security/cve/CVE-2019-15144/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15145 page", "url": "https://www.suse.com/security/cve/CVE-2019-15145/" } ], "title": "Security update for djvulibre", "tracking": { "current_release_date": "2019-09-24T08:35:04Z", "generator": { "date": "2019-09-24T08:35:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2444-1", "initial_release_date": "2019-09-24T08:35:04Z", "revision_history": [ { "date": "2019-09-24T08:35:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.25.3-5.3.1.aarch64", "product": { "name": "djvulibre-3.5.25.3-5.3.1.aarch64", "product_id": "djvulibre-3.5.25.3-5.3.1.aarch64" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.25.3-5.3.1.aarch64", "product": { "name": "djvulibre-doc-3.5.25.3-5.3.1.aarch64", "product_id": "djvulibre-doc-3.5.25.3-5.3.1.aarch64" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "product": { "name": "libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "product_id": "libdjvulibre-devel-3.5.25.3-5.3.1.aarch64" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.25.3-5.3.1.aarch64", "product": { "name": "libdjvulibre21-3.5.25.3-5.3.1.aarch64", "product_id": "libdjvulibre21-3.5.25.3-5.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.25.3-5.3.1.i586", "product": { "name": "djvulibre-3.5.25.3-5.3.1.i586", "product_id": "djvulibre-3.5.25.3-5.3.1.i586" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.25.3-5.3.1.i586", "product": { "name": "djvulibre-doc-3.5.25.3-5.3.1.i586", "product_id": "djvulibre-doc-3.5.25.3-5.3.1.i586" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.25.3-5.3.1.i586", "product": { "name": "libdjvulibre-devel-3.5.25.3-5.3.1.i586", "product_id": "libdjvulibre-devel-3.5.25.3-5.3.1.i586" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.25.3-5.3.1.i586", "product": { "name": "libdjvulibre21-3.5.25.3-5.3.1.i586", "product_id": "libdjvulibre21-3.5.25.3-5.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.25.3-5.3.1.ppc64le", "product": { "name": "djvulibre-3.5.25.3-5.3.1.ppc64le", "product_id": "djvulibre-3.5.25.3-5.3.1.ppc64le" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.25.3-5.3.1.ppc64le", "product": { "name": "djvulibre-doc-3.5.25.3-5.3.1.ppc64le", "product_id": "djvulibre-doc-3.5.25.3-5.3.1.ppc64le" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "product": { "name": "libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "product_id": "libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "product": { "name": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "product_id": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.25.3-5.3.1.s390", "product": { "name": "djvulibre-3.5.25.3-5.3.1.s390", "product_id": "djvulibre-3.5.25.3-5.3.1.s390" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.25.3-5.3.1.s390", "product": { "name": "djvulibre-doc-3.5.25.3-5.3.1.s390", "product_id": "djvulibre-doc-3.5.25.3-5.3.1.s390" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.25.3-5.3.1.s390", "product": { "name": "libdjvulibre-devel-3.5.25.3-5.3.1.s390", "product_id": "libdjvulibre-devel-3.5.25.3-5.3.1.s390" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.25.3-5.3.1.s390", "product": { "name": "libdjvulibre21-3.5.25.3-5.3.1.s390", "product_id": "libdjvulibre21-3.5.25.3-5.3.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.25.3-5.3.1.s390x", "product": { "name": "djvulibre-3.5.25.3-5.3.1.s390x", "product_id": "djvulibre-3.5.25.3-5.3.1.s390x" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.25.3-5.3.1.s390x", "product": { "name": "djvulibre-doc-3.5.25.3-5.3.1.s390x", "product_id": "djvulibre-doc-3.5.25.3-5.3.1.s390x" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "product": { "name": "libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "product_id": "libdjvulibre-devel-3.5.25.3-5.3.1.s390x" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.25.3-5.3.1.s390x", "product": { "name": "libdjvulibre21-3.5.25.3-5.3.1.s390x", "product_id": "libdjvulibre21-3.5.25.3-5.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "djvulibre-3.5.25.3-5.3.1.x86_64", "product": { "name": "djvulibre-3.5.25.3-5.3.1.x86_64", "product_id": "djvulibre-3.5.25.3-5.3.1.x86_64" } }, { "category": "product_version", "name": "djvulibre-doc-3.5.25.3-5.3.1.x86_64", "product": { "name": "djvulibre-doc-3.5.25.3-5.3.1.x86_64", "product_id": "djvulibre-doc-3.5.25.3-5.3.1.x86_64" } }, { "category": "product_version", "name": "libdjvulibre-devel-3.5.25.3-5.3.1.x86_64", "product": { "name": "libdjvulibre-devel-3.5.25.3-5.3.1.x86_64", "product_id": "libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" } }, { "category": "product_version", "name": "libdjvulibre21-3.5.25.3-5.3.1.x86_64", "product": { "name": "libdjvulibre21-3.5.25.3-5.3.1.x86_64", "product_id": "libdjvulibre21-3.5.25.3-5.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.25.3-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64" }, "product_reference": "libdjvulibre21-3.5.25.3-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.25.3-5.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64" }, "product_reference": "libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le" }, "product_reference": "libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.25.3-5.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x" }, "product_reference": "libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre-devel-3.5.25.3-5.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" }, "product_reference": "libdjvulibre-devel-3.5.25.3-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.25.3-5.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64" }, "product_reference": "libdjvulibre21-3.5.25.3-5.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le" }, "product_reference": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.25.3-5.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x" }, "product_reference": "libdjvulibre21-3.5.25.3-5.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.25.3-5.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64" }, "product_reference": "libdjvulibre21-3.5.25.3-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.25.3-5.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64" }, "product_reference": "libdjvulibre21-3.5.25.3-5.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le" }, "product_reference": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.25.3-5.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x" }, "product_reference": "libdjvulibre21-3.5.25.3-5.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libdjvulibre21-3.5.25.3-5.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64" }, "product_reference": "libdjvulibre21-3.5.25.3-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-15142", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15142" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15142", "url": "https://www.suse.com/security/cve/CVE-2019-15142" }, { "category": "external", "summary": "SUSE Bug 1146702 for CVE-2019-15142", "url": "https://bugzilla.suse.com/1146702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T08:35:04Z", "details": "moderate" } ], "title": "CVE-2019-15142" }, { "cve": "CVE-2019-15143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15143" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15143", "url": "https://www.suse.com/security/cve/CVE-2019-15143" }, { "category": "external", "summary": "SUSE Bug 1146569 for CVE-2019-15143", "url": "https://bugzilla.suse.com/1146569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T08:35:04Z", "details": "moderate" } ], "title": "CVE-2019-15143" }, { "cve": "CVE-2019-15144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15144" } ], "notes": [ { "category": "general", "text": "In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate\u003cTYPE\u003e::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15144", "url": "https://www.suse.com/security/cve/CVE-2019-15144" }, { "category": "external", "summary": "SUSE Bug 1146571 for CVE-2019-15144", "url": "https://bugzilla.suse.com/1146571" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T08:35:04Z", "details": "moderate" } ], "title": "CVE-2019-15144" }, { "cve": "CVE-2019-15145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15145" } ], "notes": [ { "category": "general", "text": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15145", "url": "https://www.suse.com/security/cve/CVE-2019-15145" }, { "category": "external", "summary": "SUSE Bug 1146572 for CVE-2019-15145", "url": "https://bugzilla.suse.com/1146572" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-24T08:35:04Z", "details": "moderate" } ], "title": "CVE-2019-15145" } ] }
ghsa-fhqx-x8f6-2w5w
Vulnerability from github
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
{ "affected": [], "aliases": [ "CVE-2019-15145" ], "database_specific": { "cwe_ids": [ "CWE-125" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-08-18T19:15:00Z", "severity": "MODERATE" }, "details": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.", "id": "GHSA-fhqx-x8f6-2w5w", "modified": "2024-04-04T01:41:53Z", "published": "2022-05-24T16:53:53Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15145" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-5032" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4198-1" }, { "type": "WEB", "url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7" }, { "type": "WEB", "url": "https://sourceforge.net/p/djvu/bugs/298" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202007-36" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2019-15145
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-15145", "description": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.", "id": "GSD-2019-15145", "references": [ "https://www.suse.com/security/cve/CVE-2019-15145.html", "https://www.debian.org/security/2021/dsa-5032", "https://ubuntu.com/security/CVE-2019-15145", "https://advisories.mageia.org/CVE-2019-15145.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-15145" ], "details": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.", "id": "GSD-2019-15145", "modified": "2023-12-13T01:23:38.538227Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15145", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://sourceforge.net/p/djvu/bugs/298/", "refsource": "MISC", "url": "https://sourceforge.net/p/djvu/bugs/298/" }, { "name": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/", "refsource": "MISC", "url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/" }, { "name": "[debian-lts-announce] 20190829 [SECURITY] [DLA 1902-1] djvulibre security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html" }, { "name": "openSUSE-SU-2019:2217", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" }, { "name": "openSUSE-SU-2019:2219", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" }, { "name": "FEDORA-2019-67ff247aea", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/" }, { "name": "FEDORA-2019-b217f90c2a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/" }, { "name": "FEDORA-2019-7ca378f076", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/" }, { "name": "USN-4198-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4198-1/" }, { "name": "FEDORA-2019-f923712bab", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/" }, { "name": "FEDORA-2019-6bc8be9d84", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/" }, { "name": "GLSA-202007-36", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202007-36" }, { "name": "[debian-lts-announce] 20210526 [SECURITY] [DLA 2667-1] djvulibre security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html" }, { "name": "DSA-5032", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-5032" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15145" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "https://sourceforge.net/p/djvu/bugs/298/", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sourceforge.net/p/djvu/bugs/298/" }, { "name": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/" }, { "name": "[debian-lts-announce] 20190829 [SECURITY] [DLA 1902-1] djvulibre security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html" }, { "name": "openSUSE-SU-2019:2217", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html" }, { "name": "openSUSE-SU-2019:2219", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html" }, { "name": "FEDORA-2019-67ff247aea", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/" }, { "name": "FEDORA-2019-b217f90c2a", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/" }, { "name": "FEDORA-2019-7ca378f076", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/" }, { "name": "USN-4198-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4198-1/" }, { "name": "FEDORA-2019-f923712bab", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/" }, { "name": "FEDORA-2019-6bc8be9d84", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/" }, { "name": "GLSA-202007-36", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202007-36" }, { "name": "[debian-lts-announce] 20210526 [SECURITY] [DLA 2667-1] djvulibre security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html" }, { "name": "DSA-5032", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-5032" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2022-03-29T19:16Z", "publishedDate": "2019-08-18T19:15Z" } } }
cnvd-2019-29361
Vulnerability from cnvd
Title: DjVuLibre缓冲区溢出漏洞(CNVD-2019-29361)
Description:
DjVuLibre是一款DjVu(计算机文件格式)的开源实现,它包括DjVu文件查看器、浏览器插件、DjVu文件解码/编码器和其它实用程序。
DjVuLibre 3.5.27版本中存在缓冲区溢出漏洞,该漏洞源于libdjvu/GBitmap.h文件未能进行零字节检查,攻击者可通过构建JB2图像文件利用该漏洞造成拒绝服务(应用程序崩溃)。
Severity: 中
Patch Name: DjVuLibre缓冲区溢出漏洞(CNVD-2019-29361)的补丁
Patch Description:
DjVuLibre是一款DjVu(计算机文件格式)的开源实现,它包括DjVu文件查看器、浏览器插件、DjVu文件解码/编码器和其它实用程序。
DjVuLibre 3.5.27版本中存在缓冲区溢出漏洞,该漏洞源于libdjvu/GBitmap.h文件未能进行零字节检查,攻击者可通过构建JB2图像文件利用该漏洞造成拒绝服务(应用程序崩溃)。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://sourceforge.net/p/djvu/bugs/298/
Reference: https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/ https://sourceforge.net/p/djvu/bugs/298/ https://nvd.nist.gov/vuln/detail/CVE-2019-15145
Name | DjVuLibre DjVuLibre 3.5.27 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-15145" } }, "description": "DjVuLibre\u662f\u4e00\u6b3eDjVu\uff08\u8ba1\u7b97\u673a\u6587\u4ef6\u683c\u5f0f\uff09\u7684\u5f00\u6e90\u5b9e\u73b0\uff0c\u5b83\u5305\u62ecDjVu\u6587\u4ef6\u67e5\u770b\u5668\u3001\u6d4f\u89c8\u5668\u63d2\u4ef6\u3001DjVu\u6587\u4ef6\u89e3\u7801/\u7f16\u7801\u5668\u548c\u5176\u5b83\u5b9e\u7528\u7a0b\u5e8f\u3002\n\nDjVuLibre 3.5.27\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8elibdjvu/GBitmap.h\u6587\u4ef6\u672a\u80fd\u8fdb\u884c\u96f6\u5b57\u8282\u68c0\u67e5\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u6784\u5efaJB2\u56fe\u50cf\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\uff09\u3002", "discovererName": "unknown", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://sourceforge.net/p/djvu/bugs/298/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-29361", "openTime": "2019-08-29", "patchDescription": "DjVuLibre\u662f\u4e00\u6b3eDjVu\uff08\u8ba1\u7b97\u673a\u6587\u4ef6\u683c\u5f0f\uff09\u7684\u5f00\u6e90\u5b9e\u73b0\uff0c\u5b83\u5305\u62ecDjVu\u6587\u4ef6\u67e5\u770b\u5668\u3001\u6d4f\u89c8\u5668\u63d2\u4ef6\u3001DjVu\u6587\u4ef6\u89e3\u7801/\u7f16\u7801\u5668\u548c\u5176\u5b83\u5b9e\u7528\u7a0b\u5e8f\u3002\r\n\r\nDjVuLibre 3.5.27\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8elibdjvu/GBitmap.h\u6587\u4ef6\u672a\u80fd\u8fdb\u884c\u96f6\u5b57\u8282\u68c0\u67e5\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u6784\u5efaJB2\u56fe\u50cf\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "DjVuLibre\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2019-29361\uff09\u7684\u8865\u4e01", "products": { "product": "DjVuLibre DjVuLibre 3.5.27" }, "referenceLink": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/\r\nhttps://sourceforge.net/p/djvu/bugs/298/\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-15145", "serverity": "\u4e2d", "submitTime": "2019-08-18", "title": "DjVuLibre\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2019-29361\uff09" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.