Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-15145 (GCVE-0-2019-15145)
Vulnerability from cvelistv5 – Published: 2019-08-18 18:30 – Updated: 2024-08-05 00:42
VLAI?
EPSS
Summary
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T00:42:03.790Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://sourceforge.net/p/djvu/bugs/298/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/"
},
{
"name": "[debian-lts-announce] 20190829 [SECURITY] [DLA 1902-1] djvulibre security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html"
},
{
"name": "openSUSE-SU-2019:2217",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html"
},
{
"name": "openSUSE-SU-2019:2219",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html"
},
{
"name": "FEDORA-2019-67ff247aea",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/"
},
{
"name": "FEDORA-2019-b217f90c2a",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/"
},
{
"name": "FEDORA-2019-7ca378f076",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/"
},
{
"name": "USN-4198-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4198-1/"
},
{
"name": "FEDORA-2019-f923712bab",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/"
},
{
"name": "FEDORA-2019-6bc8be9d84",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/"
},
{
"name": "GLSA-202007-36",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202007-36"
},
{
"name": "[debian-lts-announce] 20210526 [SECURITY] [DLA 2667-1] djvulibre security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html"
},
{
"name": "DSA-5032",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2021/dsa-5032"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-12-28T22:06:34.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://sourceforge.net/p/djvu/bugs/298/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/"
},
{
"name": "[debian-lts-announce] 20190829 [SECURITY] [DLA 1902-1] djvulibre security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html"
},
{
"name": "openSUSE-SU-2019:2217",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html"
},
{
"name": "openSUSE-SU-2019:2219",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html"
},
{
"name": "FEDORA-2019-67ff247aea",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/"
},
{
"name": "FEDORA-2019-b217f90c2a",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/"
},
{
"name": "FEDORA-2019-7ca378f076",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/"
},
{
"name": "USN-4198-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4198-1/"
},
{
"name": "FEDORA-2019-f923712bab",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/"
},
{
"name": "FEDORA-2019-6bc8be9d84",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/"
},
{
"name": "GLSA-202007-36",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202007-36"
},
{
"name": "[debian-lts-announce] 20210526 [SECURITY] [DLA 2667-1] djvulibre security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html"
},
{
"name": "DSA-5032",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2021/dsa-5032"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15145",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sourceforge.net/p/djvu/bugs/298/",
"refsource": "MISC",
"url": "https://sourceforge.net/p/djvu/bugs/298/"
},
{
"name": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/",
"refsource": "MISC",
"url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/"
},
{
"name": "[debian-lts-announce] 20190829 [SECURITY] [DLA 1902-1] djvulibre security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html"
},
{
"name": "openSUSE-SU-2019:2217",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html"
},
{
"name": "openSUSE-SU-2019:2219",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html"
},
{
"name": "FEDORA-2019-67ff247aea",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/"
},
{
"name": "FEDORA-2019-b217f90c2a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/"
},
{
"name": "FEDORA-2019-7ca378f076",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/"
},
{
"name": "USN-4198-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4198-1/"
},
{
"name": "FEDORA-2019-f923712bab",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/"
},
{
"name": "FEDORA-2019-6bc8be9d84",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/"
},
{
"name": "GLSA-202007-36",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202007-36"
},
{
"name": "[debian-lts-announce] 20210526 [SECURITY] [DLA 2667-1] djvulibre security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html"
},
{
"name": "DSA-5032",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-5032"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-15145",
"datePublished": "2019-08-18T18:30:05.000Z",
"dateReserved": "2019-08-18T00:00:00.000Z",
"dateUpdated": "2024-08-05T00:42:03.790Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:djvulibre_project:djvulibre:3.5.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6174AF9B-0B0B-4602-A693-A775A541276B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D100F7CE-FC64-4CC6-852A-6136D72DA419\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\", \"matchCriteriaId\": \"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A31C8344-3E02-4EB8-8BD8-4C84B7959624\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1E78106-58E6-4D59-990F-75DA575BFAD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.\"}, {\"lang\": \"es\", \"value\": \"DjVuLibre versi\\u00f3n 3.5.27, permite a atacantes causar un ataque de denegaci\\u00f3n de servicio (bloqueo de aplicaci\\u00f3n por medio de una lectura fuera de l\\u00edmites) mediante el dise\\u00f1o de un archivo de imagen JB2 corrupto que es manejado inapropiadamente en la funci\\u00f3n JB2Dict::JB2Codec::get_direct_context en el archivo libdjvu/JB2Image.h debido a una falta de comprobaci\\u00f3n de cero bytes en el archivo libdjvu/GBitmap.h.\"}]",
"id": "CVE-2019-15145",
"lastModified": "2024-11-21T04:28:09.390",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2019-08-18T19:15:10.387",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://security.gentoo.org/glsa/202007-36\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://sourceforge.net/p/djvu/bugs/298/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4198-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2021/dsa-5032\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202007-36\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://sourceforge.net/p/djvu/bugs/298/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4198-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2021/dsa-5032\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-15145\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-08-18T19:15:10.387\",\"lastModified\":\"2024-11-21T04:28:09.390\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.\"},{\"lang\":\"es\",\"value\":\"DjVuLibre versi\u00f3n 3.5.27, permite a atacantes causar un ataque de denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n por medio de una lectura fuera de l\u00edmites) mediante el dise\u00f1o de un archivo de imagen JB2 corrupto que es manejado inapropiadamente en la funci\u00f3n JB2Dict::JB2Codec::get_direct_context en el archivo libdjvu/JB2Image.h debido a una falta de comprobaci\u00f3n de cero bytes en el archivo libdjvu/GBitmap.h.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:djvulibre_project:djvulibre:3.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6174AF9B-0B0B-4602-A693-A775A541276B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A31C8344-3E02-4EB8-8BD8-4C84B7959624\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202007-36\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sourceforge.net/p/djvu/bugs/298/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4198-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-5032\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202007-36\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sourceforge.net/p/djvu/bugs/298/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4198-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-5032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
SUSE-SU-2019:2444-1
Vulnerability from csaf_suse - Published: 2019-09-24 08:35 - Updated: 2019-09-24 08:35Summary
Security update for djvulibre
Severity
Moderate
Notes
Title of the patch: Security update for djvulibre
Description of the patch: This update for djvulibre fixes the following issues:
Security issues fixed:
- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).
- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).
- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).
- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).
- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).
Patchnames: SUSE-2019-2444,SUSE-SLE-DESKTOP-12-SP4-2019-2444,SUSE-SLE-SDK-12-SP4-2019-2444,SUSE-SLE-SERVER-12-SP4-2019-2444
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for djvulibre",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for djvulibre fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).\n- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).\n- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).\n- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).\n- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2444,SUSE-SLE-DESKTOP-12-SP4-2019-2444,SUSE-SLE-SDK-12-SP4-2019-2444,SUSE-SLE-SERVER-12-SP4-2019-2444",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2444-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2444-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192444-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2444-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005957.html"
},
{
"category": "self",
"summary": "SUSE Bug 1146569",
"url": "https://bugzilla.suse.com/1146569"
},
{
"category": "self",
"summary": "SUSE Bug 1146571",
"url": "https://bugzilla.suse.com/1146571"
},
{
"category": "self",
"summary": "SUSE Bug 1146572",
"url": "https://bugzilla.suse.com/1146572"
},
{
"category": "self",
"summary": "SUSE Bug 1146702",
"url": "https://bugzilla.suse.com/1146702"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15142 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15143 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15144 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15145 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15145/"
}
],
"title": "Security update for djvulibre",
"tracking": {
"current_release_date": "2019-09-24T08:35:04Z",
"generator": {
"date": "2019-09-24T08:35:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2444-1",
"initial_release_date": "2019-09-24T08:35:04Z",
"revision_history": [
{
"date": "2019-09-24T08:35:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.25.3-5.3.1.aarch64",
"product": {
"name": "djvulibre-3.5.25.3-5.3.1.aarch64",
"product_id": "djvulibre-3.5.25.3-5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.25.3-5.3.1.aarch64",
"product": {
"name": "djvulibre-doc-3.5.25.3-5.3.1.aarch64",
"product_id": "djvulibre-doc-3.5.25.3-5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"product": {
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"product_id": "libdjvulibre-devel-3.5.25.3-5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"product": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"product_id": "libdjvulibre21-3.5.25.3-5.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.25.3-5.3.1.i586",
"product": {
"name": "djvulibre-3.5.25.3-5.3.1.i586",
"product_id": "djvulibre-3.5.25.3-5.3.1.i586"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.25.3-5.3.1.i586",
"product": {
"name": "djvulibre-doc-3.5.25.3-5.3.1.i586",
"product_id": "djvulibre-doc-3.5.25.3-5.3.1.i586"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.i586",
"product": {
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.i586",
"product_id": "libdjvulibre-devel-3.5.25.3-5.3.1.i586"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.25.3-5.3.1.i586",
"product": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.i586",
"product_id": "libdjvulibre21-3.5.25.3-5.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.25.3-5.3.1.ppc64le",
"product": {
"name": "djvulibre-3.5.25.3-5.3.1.ppc64le",
"product_id": "djvulibre-3.5.25.3-5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.25.3-5.3.1.ppc64le",
"product": {
"name": "djvulibre-doc-3.5.25.3-5.3.1.ppc64le",
"product_id": "djvulibre-doc-3.5.25.3-5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"product": {
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"product_id": "libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"product": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"product_id": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.25.3-5.3.1.s390",
"product": {
"name": "djvulibre-3.5.25.3-5.3.1.s390",
"product_id": "djvulibre-3.5.25.3-5.3.1.s390"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.25.3-5.3.1.s390",
"product": {
"name": "djvulibre-doc-3.5.25.3-5.3.1.s390",
"product_id": "djvulibre-doc-3.5.25.3-5.3.1.s390"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.s390",
"product": {
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.s390",
"product_id": "libdjvulibre-devel-3.5.25.3-5.3.1.s390"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.25.3-5.3.1.s390",
"product": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.s390",
"product_id": "libdjvulibre21-3.5.25.3-5.3.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.25.3-5.3.1.s390x",
"product": {
"name": "djvulibre-3.5.25.3-5.3.1.s390x",
"product_id": "djvulibre-3.5.25.3-5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.25.3-5.3.1.s390x",
"product": {
"name": "djvulibre-doc-3.5.25.3-5.3.1.s390x",
"product_id": "djvulibre-doc-3.5.25.3-5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"product": {
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"product_id": "libdjvulibre-devel-3.5.25.3-5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.25.3-5.3.1.s390x",
"product": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.s390x",
"product_id": "libdjvulibre21-3.5.25.3-5.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.25.3-5.3.1.x86_64",
"product": {
"name": "djvulibre-3.5.25.3-5.3.1.x86_64",
"product_id": "djvulibre-3.5.25.3-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.25.3-5.3.1.x86_64",
"product": {
"name": "djvulibre-doc-3.5.25.3-5.3.1.x86_64",
"product_id": "djvulibre-doc-3.5.25.3-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.x86_64",
"product": {
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.x86_64",
"product_id": "libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"product": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"product_id": "libdjvulibre21-3.5.25.3-5.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64"
},
"product_reference": "libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64"
},
"product_reference": "libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le"
},
"product_reference": "libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x"
},
"product_reference": "libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.25.3-5.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
},
"product_reference": "libdjvulibre-devel-3.5.25.3-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64"
},
"product_reference": "libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le"
},
"product_reference": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x"
},
"product_reference": "libdjvulibre21-3.5.25.3-5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64"
},
"product_reference": "libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64"
},
"product_reference": "libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le"
},
"product_reference": "libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x"
},
"product_reference": "libdjvulibre21-3.5.25.3-5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.25.3-5.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64"
},
"product_reference": "libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-15142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15142"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15142",
"url": "https://www.suse.com/security/cve/CVE-2019-15142"
},
{
"category": "external",
"summary": "SUSE Bug 1146702 for CVE-2019-15142",
"url": "https://bugzilla.suse.com/1146702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T08:35:04Z",
"details": "moderate"
}
],
"title": "CVE-2019-15142"
},
{
"cve": "CVE-2019-15143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15143"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15143",
"url": "https://www.suse.com/security/cve/CVE-2019-15143"
},
{
"category": "external",
"summary": "SUSE Bug 1146569 for CVE-2019-15143",
"url": "https://bugzilla.suse.com/1146569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T08:35:04Z",
"details": "moderate"
}
],
"title": "CVE-2019-15143"
},
{
"cve": "CVE-2019-15144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15144"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate\u003cTYPE\u003e::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15144",
"url": "https://www.suse.com/security/cve/CVE-2019-15144"
},
{
"category": "external",
"summary": "SUSE Bug 1146571 for CVE-2019-15144",
"url": "https://bugzilla.suse.com/1146571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T08:35:04Z",
"details": "moderate"
}
],
"title": "CVE-2019-15144"
},
{
"cve": "CVE-2019-15145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15145"
}
],
"notes": [
{
"category": "general",
"text": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15145",
"url": "https://www.suse.com/security/cve/CVE-2019-15145"
},
{
"category": "external",
"summary": "SUSE Bug 1146572 for CVE-2019-15145",
"url": "https://bugzilla.suse.com/1146572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libdjvulibre21-3.5.25.3-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libdjvulibre-devel-3.5.25.3-5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T08:35:04Z",
"details": "moderate"
}
],
"title": "CVE-2019-15145"
}
]
}
SUSE-SU-2019:2452-1
Vulnerability from csaf_suse - Published: 2019-09-24 14:45 - Updated: 2019-09-24 14:45Summary
Security update for djvulibre
Severity
Moderate
Notes
Title of the patch: Security update for djvulibre
Description of the patch: This update for djvulibre fixes the following issues:
Security issues fixed:
- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).
- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).
- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).
- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).
- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).
Patchnames: SUSE-2019-2452,SUSE-SLE-Module-Desktop-Applications-15-2019-2452,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2452,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2452,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2452,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2452
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for djvulibre",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for djvulibre fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).\n- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).\n- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).\n- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).\n- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2452,SUSE-SLE-Module-Desktop-Applications-15-2019-2452,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2452,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2452,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2452,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2452",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2452-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2452-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192452-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2452-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005960.html"
},
{
"category": "self",
"summary": "SUSE Bug 1146569",
"url": "https://bugzilla.suse.com/1146569"
},
{
"category": "self",
"summary": "SUSE Bug 1146571",
"url": "https://bugzilla.suse.com/1146571"
},
{
"category": "self",
"summary": "SUSE Bug 1146572",
"url": "https://bugzilla.suse.com/1146572"
},
{
"category": "self",
"summary": "SUSE Bug 1146702",
"url": "https://bugzilla.suse.com/1146702"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15142 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15143 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15144 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15145 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15145/"
}
],
"title": "Security update for djvulibre",
"tracking": {
"current_release_date": "2019-09-24T14:45:53Z",
"generator": {
"date": "2019-09-24T14:45:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2452-1",
"initial_release_date": "2019-09-24T14:45:53Z",
"revision_history": [
{
"date": "2019-09-24T14:45:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.27-3.3.1.aarch64",
"product": {
"name": "djvulibre-3.5.27-3.3.1.aarch64",
"product_id": "djvulibre-3.5.27-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.27-3.3.1.aarch64",
"product": {
"name": "djvulibre-doc-3.5.27-3.3.1.aarch64",
"product_id": "djvulibre-doc-3.5.27-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"product": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"product_id": "libdjvulibre-devel-3.5.27-3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.27-3.3.1.aarch64",
"product": {
"name": "libdjvulibre21-3.5.27-3.3.1.aarch64",
"product_id": "libdjvulibre21-3.5.27-3.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.27-3.3.1.i586",
"product": {
"name": "djvulibre-3.5.27-3.3.1.i586",
"product_id": "djvulibre-3.5.27-3.3.1.i586"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.27-3.3.1.i586",
"product": {
"name": "djvulibre-doc-3.5.27-3.3.1.i586",
"product_id": "djvulibre-doc-3.5.27-3.3.1.i586"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.27-3.3.1.i586",
"product": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.i586",
"product_id": "libdjvulibre-devel-3.5.27-3.3.1.i586"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.27-3.3.1.i586",
"product": {
"name": "libdjvulibre21-3.5.27-3.3.1.i586",
"product_id": "libdjvulibre21-3.5.27-3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.27-3.3.1.ppc64le",
"product": {
"name": "djvulibre-3.5.27-3.3.1.ppc64le",
"product_id": "djvulibre-3.5.27-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.27-3.3.1.ppc64le",
"product": {
"name": "djvulibre-doc-3.5.27-3.3.1.ppc64le",
"product_id": "djvulibre-doc-3.5.27-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"product": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"product_id": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.27-3.3.1.ppc64le",
"product": {
"name": "libdjvulibre21-3.5.27-3.3.1.ppc64le",
"product_id": "libdjvulibre21-3.5.27-3.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.27-3.3.1.s390x",
"product": {
"name": "djvulibre-3.5.27-3.3.1.s390x",
"product_id": "djvulibre-3.5.27-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.27-3.3.1.s390x",
"product": {
"name": "djvulibre-doc-3.5.27-3.3.1.s390x",
"product_id": "djvulibre-doc-3.5.27-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.27-3.3.1.s390x",
"product": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.s390x",
"product_id": "libdjvulibre-devel-3.5.27-3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.27-3.3.1.s390x",
"product": {
"name": "libdjvulibre21-3.5.27-3.3.1.s390x",
"product_id": "libdjvulibre21-3.5.27-3.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.27-3.3.1.x86_64",
"product": {
"name": "djvulibre-3.5.27-3.3.1.x86_64",
"product_id": "djvulibre-3.5.27-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.27-3.3.1.x86_64",
"product": {
"name": "djvulibre-doc-3.5.27-3.3.1.x86_64",
"product_id": "djvulibre-doc-3.5.27-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"product": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"product_id": "libdjvulibre-devel-3.5.27-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.27-3.3.1.x86_64",
"product": {
"name": "libdjvulibre21-3.5.27-3.3.1.x86_64",
"product_id": "libdjvulibre21-3.5.27-3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Desktop Applications 15",
"product": {
"name": "SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-desktop-applications:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64"
},
"product_reference": "libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le"
},
"product_reference": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x"
},
"product_reference": "libdjvulibre-devel-3.5.27-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64"
},
"product_reference": "libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.27-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64"
},
"product_reference": "libdjvulibre21-3.5.27-3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.27-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le"
},
"product_reference": "libdjvulibre21-3.5.27-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.27-3.3.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x"
},
"product_reference": "libdjvulibre21-3.5.27-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.27-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64"
},
"product_reference": "libdjvulibre21-3.5.27-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64"
},
"product_reference": "libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le"
},
"product_reference": "libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x"
},
"product_reference": "libdjvulibre-devel-3.5.27-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.27-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64"
},
"product_reference": "libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.27-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64"
},
"product_reference": "libdjvulibre21-3.5.27-3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.27-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le"
},
"product_reference": "libdjvulibre21-3.5.27-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.27-3.3.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x"
},
"product_reference": "libdjvulibre21-3.5.27-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.27-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64"
},
"product_reference": "libdjvulibre21-3.5.27-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-3.5.27-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64"
},
"product_reference": "djvulibre-3.5.27-3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-3.5.27-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le"
},
"product_reference": "djvulibre-3.5.27-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-3.5.27-3.3.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x"
},
"product_reference": "djvulibre-3.5.27-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-3.5.27-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
},
"product_reference": "djvulibre-3.5.27-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-15142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15142"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15142",
"url": "https://www.suse.com/security/cve/CVE-2019-15142"
},
{
"category": "external",
"summary": "SUSE Bug 1146702 for CVE-2019-15142",
"url": "https://bugzilla.suse.com/1146702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T14:45:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-15142"
},
{
"cve": "CVE-2019-15143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15143"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15143",
"url": "https://www.suse.com/security/cve/CVE-2019-15143"
},
{
"category": "external",
"summary": "SUSE Bug 1146569 for CVE-2019-15143",
"url": "https://bugzilla.suse.com/1146569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T14:45:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-15143"
},
{
"cve": "CVE-2019-15144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15144"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate\u003cTYPE\u003e::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15144",
"url": "https://www.suse.com/security/cve/CVE-2019-15144"
},
{
"category": "external",
"summary": "SUSE Bug 1146571 for CVE-2019-15144",
"url": "https://bugzilla.suse.com/1146571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T14:45:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-15144"
},
{
"cve": "CVE-2019-15145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15145"
}
],
"notes": [
{
"category": "general",
"text": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15145",
"url": "https://www.suse.com/security/cve/CVE-2019-15145"
},
{
"category": "external",
"summary": "SUSE Bug 1146572 for CVE-2019-15145",
"url": "https://bugzilla.suse.com/1146572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP1:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre-devel-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libdjvulibre21-3.5.27-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15:djvulibre-3.5.27-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T14:45:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-15145"
}
]
}
GHSA-FHQX-X8F6-2W5W
Vulnerability from github – Published: 2022-05-24 16:53 – Updated: 2024-04-04 01:41
VLAI?
Details
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2019-15145"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-08-18T19:15:00Z",
"severity": "MODERATE"
},
"details": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.",
"id": "GHSA-fhqx-x8f6-2w5w",
"modified": "2024-04-04T01:41:53Z",
"published": "2022-05-24T16:53:53Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15145"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2021/dsa-5032"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4198-1"
},
{
"type": "WEB",
"url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7"
},
{
"type": "WEB",
"url": "https://sourceforge.net/p/djvu/bugs/298"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202007-36"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
OPENSUSE-SU-2019:2219-1
Vulnerability from csaf_opensuse - Published: 2019-09-30 10:20 - Updated: 2019-09-30 10:20Summary
Security update for djvulibre
Severity
Moderate
Notes
Title of the patch: Security update for djvulibre
Description of the patch: This update for djvulibre fixes the following issues:
Security issues fixed:
- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).
- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).
- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).
- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).
- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames: openSUSE-2019-2219
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for djvulibre",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for djvulibre fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).\n- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).\n- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).\n- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).\n- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2219",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2219-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2219-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2F2PNQ46QIVPZMNWBDFGGMLWSIMKM2DB/#2F2PNQ46QIVPZMNWBDFGGMLWSIMKM2DB"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2219-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2F2PNQ46QIVPZMNWBDFGGMLWSIMKM2DB/#2F2PNQ46QIVPZMNWBDFGGMLWSIMKM2DB"
},
{
"category": "self",
"summary": "SUSE Bug 1146569",
"url": "https://bugzilla.suse.com/1146569"
},
{
"category": "self",
"summary": "SUSE Bug 1146571",
"url": "https://bugzilla.suse.com/1146571"
},
{
"category": "self",
"summary": "SUSE Bug 1146572",
"url": "https://bugzilla.suse.com/1146572"
},
{
"category": "self",
"summary": "SUSE Bug 1146702",
"url": "https://bugzilla.suse.com/1146702"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15142 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15143 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15144 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15145 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15145/"
}
],
"title": "Security update for djvulibre",
"tracking": {
"current_release_date": "2019-09-30T10:20:29Z",
"generator": {
"date": "2019-09-30T10:20:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2219-1",
"initial_release_date": "2019-09-30T10:20:29Z",
"revision_history": [
{
"date": "2019-09-30T10:20:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.27-lp151.3.3.1.i586",
"product": {
"name": "djvulibre-3.5.27-lp151.3.3.1.i586",
"product_id": "djvulibre-3.5.27-lp151.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"product": {
"name": "djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"product_id": "djvulibre-doc-3.5.27-lp151.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"product": {
"name": "libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"product_id": "libdjvulibre-devel-3.5.27-lp151.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"product": {
"name": "libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"product_id": "libdjvulibre21-3.5.27-lp151.3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.27-lp151.3.3.1.x86_64",
"product": {
"name": "djvulibre-3.5.27-lp151.3.3.1.x86_64",
"product_id": "djvulibre-3.5.27-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"product": {
"name": "djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"product_id": "djvulibre-doc-3.5.27-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"product": {
"name": "libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"product_id": "libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.27-lp151.3.3.1.x86_64",
"product": {
"name": "libdjvulibre21-3.5.27-lp151.3.3.1.x86_64",
"product_id": "libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-3.5.27-lp151.3.3.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586"
},
"product_reference": "djvulibre-3.5.27-lp151.3.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-3.5.27-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64"
},
"product_reference": "djvulibre-3.5.27-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-doc-3.5.27-lp151.3.3.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586"
},
"product_reference": "djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-doc-3.5.27-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64"
},
"product_reference": "djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.27-lp151.3.3.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586"
},
"product_reference": "libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64"
},
"product_reference": "libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.27-lp151.3.3.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586"
},
"product_reference": "libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.27-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
},
"product_reference": "libdjvulibre21-3.5.27-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-15142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15142"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15142",
"url": "https://www.suse.com/security/cve/CVE-2019-15142"
},
{
"category": "external",
"summary": "SUSE Bug 1146702 for CVE-2019-15142",
"url": "https://bugzilla.suse.com/1146702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T10:20:29Z",
"details": "moderate"
}
],
"title": "CVE-2019-15142"
},
{
"cve": "CVE-2019-15143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15143"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15143",
"url": "https://www.suse.com/security/cve/CVE-2019-15143"
},
{
"category": "external",
"summary": "SUSE Bug 1146569 for CVE-2019-15143",
"url": "https://bugzilla.suse.com/1146569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T10:20:29Z",
"details": "moderate"
}
],
"title": "CVE-2019-15143"
},
{
"cve": "CVE-2019-15144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15144"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate\u003cTYPE\u003e::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15144",
"url": "https://www.suse.com/security/cve/CVE-2019-15144"
},
{
"category": "external",
"summary": "SUSE Bug 1146571 for CVE-2019-15144",
"url": "https://bugzilla.suse.com/1146571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T10:20:29Z",
"details": "moderate"
}
],
"title": "CVE-2019-15144"
},
{
"cve": "CVE-2019-15145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15145"
}
],
"notes": [
{
"category": "general",
"text": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15145",
"url": "https://www.suse.com/security/cve/CVE-2019-15145"
},
{
"category": "external",
"summary": "SUSE Bug 1146572 for CVE-2019-15145",
"url": "https://bugzilla.suse.com/1146572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:djvulibre-doc-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre-devel-3.5.27-lp151.3.3.1.x86_64",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.i586",
"openSUSE Leap 15.1:libdjvulibre21-3.5.27-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T10:20:29Z",
"details": "moderate"
}
],
"title": "CVE-2019-15145"
}
]
}
OPENSUSE-SU-2024:10719-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
djvulibre-3.5.28-3.2 on GA media
Severity
Moderate
Notes
Title of the patch: djvulibre-3.5.28-3.2 on GA media
Description of the patch: These are all security issues fixed in the djvulibre-3.5.28-3.2 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-10719
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "djvulibre-3.5.28-3.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the djvulibre-3.5.28-3.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10719",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10719-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15142 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15143 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15144 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15145 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18804 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18804/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32492 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32493 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32493/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3500 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3500/"
}
],
"title": "djvulibre-3.5.28-3.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10719-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.28-3.2.aarch64",
"product": {
"name": "djvulibre-3.5.28-3.2.aarch64",
"product_id": "djvulibre-3.5.28-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.28-3.2.aarch64",
"product": {
"name": "djvulibre-doc-3.5.28-3.2.aarch64",
"product_id": "djvulibre-doc-3.5.28-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.28-3.2.aarch64",
"product": {
"name": "libdjvulibre-devel-3.5.28-3.2.aarch64",
"product_id": "libdjvulibre-devel-3.5.28-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.28-3.2.aarch64",
"product": {
"name": "libdjvulibre21-3.5.28-3.2.aarch64",
"product_id": "libdjvulibre21-3.5.28-3.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.28-3.2.ppc64le",
"product": {
"name": "djvulibre-3.5.28-3.2.ppc64le",
"product_id": "djvulibre-3.5.28-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.28-3.2.ppc64le",
"product": {
"name": "djvulibre-doc-3.5.28-3.2.ppc64le",
"product_id": "djvulibre-doc-3.5.28-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.28-3.2.ppc64le",
"product": {
"name": "libdjvulibre-devel-3.5.28-3.2.ppc64le",
"product_id": "libdjvulibre-devel-3.5.28-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.28-3.2.ppc64le",
"product": {
"name": "libdjvulibre21-3.5.28-3.2.ppc64le",
"product_id": "libdjvulibre21-3.5.28-3.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.28-3.2.s390x",
"product": {
"name": "djvulibre-3.5.28-3.2.s390x",
"product_id": "djvulibre-3.5.28-3.2.s390x"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.28-3.2.s390x",
"product": {
"name": "djvulibre-doc-3.5.28-3.2.s390x",
"product_id": "djvulibre-doc-3.5.28-3.2.s390x"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.28-3.2.s390x",
"product": {
"name": "libdjvulibre-devel-3.5.28-3.2.s390x",
"product_id": "libdjvulibre-devel-3.5.28-3.2.s390x"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.28-3.2.s390x",
"product": {
"name": "libdjvulibre21-3.5.28-3.2.s390x",
"product_id": "libdjvulibre21-3.5.28-3.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.28-3.2.x86_64",
"product": {
"name": "djvulibre-3.5.28-3.2.x86_64",
"product_id": "djvulibre-3.5.28-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.28-3.2.x86_64",
"product": {
"name": "djvulibre-doc-3.5.28-3.2.x86_64",
"product_id": "djvulibre-doc-3.5.28-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.28-3.2.x86_64",
"product": {
"name": "libdjvulibre-devel-3.5.28-3.2.x86_64",
"product_id": "libdjvulibre-devel-3.5.28-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.28-3.2.x86_64",
"product": {
"name": "libdjvulibre21-3.5.28-3.2.x86_64",
"product_id": "libdjvulibre21-3.5.28-3.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-3.5.28-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64"
},
"product_reference": "djvulibre-3.5.28-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-3.5.28-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le"
},
"product_reference": "djvulibre-3.5.28-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-3.5.28-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x"
},
"product_reference": "djvulibre-3.5.28-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-3.5.28-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64"
},
"product_reference": "djvulibre-3.5.28-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-doc-3.5.28-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64"
},
"product_reference": "djvulibre-doc-3.5.28-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-doc-3.5.28-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le"
},
"product_reference": "djvulibre-doc-3.5.28-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-doc-3.5.28-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x"
},
"product_reference": "djvulibre-doc-3.5.28-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-doc-3.5.28-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64"
},
"product_reference": "djvulibre-doc-3.5.28-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.28-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64"
},
"product_reference": "libdjvulibre-devel-3.5.28-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.28-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le"
},
"product_reference": "libdjvulibre-devel-3.5.28-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.28-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x"
},
"product_reference": "libdjvulibre-devel-3.5.28-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.28-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64"
},
"product_reference": "libdjvulibre-devel-3.5.28-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.28-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64"
},
"product_reference": "libdjvulibre21-3.5.28-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.28-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le"
},
"product_reference": "libdjvulibre21-3.5.28-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.28-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x"
},
"product_reference": "libdjvulibre21-3.5.28-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.28-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
},
"product_reference": "libdjvulibre21-3.5.28-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-15142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15142"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15142",
"url": "https://www.suse.com/security/cve/CVE-2019-15142"
},
{
"category": "external",
"summary": "SUSE Bug 1146702 for CVE-2019-15142",
"url": "https://bugzilla.suse.com/1146702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15142"
},
{
"cve": "CVE-2019-15143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15143"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15143",
"url": "https://www.suse.com/security/cve/CVE-2019-15143"
},
{
"category": "external",
"summary": "SUSE Bug 1146569 for CVE-2019-15143",
"url": "https://bugzilla.suse.com/1146569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15143"
},
{
"cve": "CVE-2019-15144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15144"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate\u003cTYPE\u003e::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15144",
"url": "https://www.suse.com/security/cve/CVE-2019-15144"
},
{
"category": "external",
"summary": "SUSE Bug 1146571 for CVE-2019-15144",
"url": "https://bugzilla.suse.com/1146571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15144"
},
{
"cve": "CVE-2019-15145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15145"
}
],
"notes": [
{
"category": "general",
"text": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15145",
"url": "https://www.suse.com/security/cve/CVE-2019-15145"
},
{
"category": "external",
"summary": "SUSE Bug 1146572 for CVE-2019-15145",
"url": "https://bugzilla.suse.com/1146572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15145"
},
{
"cve": "CVE-2019-18804",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18804"
}
],
"notes": [
{
"category": "general",
"text": "DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18804",
"url": "https://www.suse.com/security/cve/CVE-2019-18804"
},
{
"category": "external",
"summary": "SUSE Bug 1156188 for CVE-2019-18804",
"url": "https://bugzilla.suse.com/1156188"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-18804"
},
{
"cve": "CVE-2021-32490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32490"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds write in function DJVU::filter_bv() via crafted djvu file may lead to application crash and other consequences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32490",
"url": "https://www.suse.com/security/cve/CVE-2021-32490"
},
{
"category": "external",
"summary": "SUSE Bug 1185895 for CVE-2021-32490",
"url": "https://bugzilla.suse.com/1185895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-32490"
},
{
"cve": "CVE-2021-32491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32491"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in djvulibre-3.5.28 and earlier. An integer overflow in function render() in tools/ddjvu via crafted djvu file may lead to application crash and other consequences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32491",
"url": "https://www.suse.com/security/cve/CVE-2021-32491"
},
{
"category": "external",
"summary": "SUSE Bug 1185900 for CVE-2021-32491",
"url": "https://bugzilla.suse.com/1185900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-32491"
},
{
"cve": "CVE-2021-32492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32492"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file may lead to application crash and other consequences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32492",
"url": "https://www.suse.com/security/cve/CVE-2021-32492"
},
{
"category": "external",
"summary": "SUSE Bug 1185904 for CVE-2021-32492",
"url": "https://bugzilla.suse.com/1185904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-32492"
},
{
"cve": "CVE-2021-32493",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32493"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in djvulibre-3.5.28 and earlier. A heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file may lead to application crash and other consequences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32493",
"url": "https://www.suse.com/security/cve/CVE-2021-32493"
},
{
"category": "external",
"summary": "SUSE Bug 1185905 for CVE-2021-32493",
"url": "https://bugzilla.suse.com/1185905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-32493"
},
{
"cve": "CVE-2021-3500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3500"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in djvulibre-3.5.28 and earlier. A Stack overflow in function DJVU::DjVuDocument::get_djvu_file() via crafted djvu file may lead to application crash and other consequences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3500",
"url": "https://www.suse.com/security/cve/CVE-2021-3500"
},
{
"category": "external",
"summary": "SUSE Bug 1186253 for CVE-2021-3500",
"url": "https://bugzilla.suse.com/1186253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:djvulibre-doc-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre-devel-3.5.28-3.2.x86_64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.aarch64",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.ppc64le",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.s390x",
"openSUSE Tumbleweed:libdjvulibre21-3.5.28-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3500"
}
]
}
OPENSUSE-SU-2019:2217-1
Vulnerability from csaf_opensuse - Published: 2019-09-30 04:19 - Updated: 2019-09-30 04:19Summary
Security update for djvulibre
Severity
Moderate
Notes
Title of the patch: Security update for djvulibre
Description of the patch: This update for djvulibre fixes the following issues:
Security issues fixed:
- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).
- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).
- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).
- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).
- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames: openSUSE-2019-2217
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for djvulibre",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for djvulibre fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-15142: Fixed heap-based buffer over-read (bsc#1146702).\n- CVE-2019-15143: Fixed resource exhaustion caused by corrupted image files (bsc#1146569).\n- CVE-2019-15144: Fixed denial-of-service caused by crafted PBM image files (bsc#1146571).\n- CVE-2019-15145: Fixed out-of-bounds read caused by corrupted JB2 image files (bsc#1146572).\n- Fixed segfault when libtiff encounters corrupted TIFF (upstream issue #295).\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2217",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2217-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2217-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IH4MQKYJLC6RE2GZDHVFRWARHBFRQAP4/#IH4MQKYJLC6RE2GZDHVFRWARHBFRQAP4"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2217-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IH4MQKYJLC6RE2GZDHVFRWARHBFRQAP4/#IH4MQKYJLC6RE2GZDHVFRWARHBFRQAP4"
},
{
"category": "self",
"summary": "SUSE Bug 1146569",
"url": "https://bugzilla.suse.com/1146569"
},
{
"category": "self",
"summary": "SUSE Bug 1146571",
"url": "https://bugzilla.suse.com/1146571"
},
{
"category": "self",
"summary": "SUSE Bug 1146572",
"url": "https://bugzilla.suse.com/1146572"
},
{
"category": "self",
"summary": "SUSE Bug 1146702",
"url": "https://bugzilla.suse.com/1146702"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15142 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15143 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15143/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15144 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15145 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15145/"
}
],
"title": "Security update for djvulibre",
"tracking": {
"current_release_date": "2019-09-30T04:19:41Z",
"generator": {
"date": "2019-09-30T04:19:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2217-1",
"initial_release_date": "2019-09-30T04:19:41Z",
"revision_history": [
{
"date": "2019-09-30T04:19:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.27-lp150.2.3.1.i586",
"product": {
"name": "djvulibre-3.5.27-lp150.2.3.1.i586",
"product_id": "djvulibre-3.5.27-lp150.2.3.1.i586"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"product": {
"name": "djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"product_id": "djvulibre-doc-3.5.27-lp150.2.3.1.i586"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"product": {
"name": "libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"product_id": "libdjvulibre-devel-3.5.27-lp150.2.3.1.i586"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"product": {
"name": "libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"product_id": "libdjvulibre21-3.5.27-lp150.2.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "djvulibre-3.5.27-lp150.2.3.1.x86_64",
"product": {
"name": "djvulibre-3.5.27-lp150.2.3.1.x86_64",
"product_id": "djvulibre-3.5.27-lp150.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"product": {
"name": "djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"product_id": "djvulibre-doc-3.5.27-lp150.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"product": {
"name": "libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"product_id": "libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdjvulibre21-3.5.27-lp150.2.3.1.x86_64",
"product": {
"name": "libdjvulibre21-3.5.27-lp150.2.3.1.x86_64",
"product_id": "libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-3.5.27-lp150.2.3.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586"
},
"product_reference": "djvulibre-3.5.27-lp150.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-3.5.27-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64"
},
"product_reference": "djvulibre-3.5.27-lp150.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-doc-3.5.27-lp150.2.3.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586"
},
"product_reference": "djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "djvulibre-doc-3.5.27-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64"
},
"product_reference": "djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.27-lp150.2.3.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586"
},
"product_reference": "libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64"
},
"product_reference": "libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.27-lp150.2.3.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586"
},
"product_reference": "libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdjvulibre21-3.5.27-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
},
"product_reference": "libdjvulibre21-3.5.27-lp150.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-15142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15142"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15142",
"url": "https://www.suse.com/security/cve/CVE-2019-15142"
},
{
"category": "external",
"summary": "SUSE Bug 1146702 for CVE-2019-15142",
"url": "https://bugzilla.suse.com/1146702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T04:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2019-15142"
},
{
"cve": "CVE-2019-15143",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15143"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15143",
"url": "https://www.suse.com/security/cve/CVE-2019-15143"
},
{
"category": "external",
"summary": "SUSE Bug 1146569 for CVE-2019-15143",
"url": "https://bugzilla.suse.com/1146569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T04:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2019-15143"
},
{
"cve": "CVE-2019-15144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15144"
}
],
"notes": [
{
"category": "general",
"text": "In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate\u003cTYPE\u003e::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15144",
"url": "https://www.suse.com/security/cve/CVE-2019-15144"
},
{
"category": "external",
"summary": "SUSE Bug 1146571 for CVE-2019-15144",
"url": "https://bugzilla.suse.com/1146571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T04:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2019-15144"
},
{
"cve": "CVE-2019-15145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15145"
}
],
"notes": [
{
"category": "general",
"text": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15145",
"url": "https://www.suse.com/security/cve/CVE-2019-15145"
},
{
"category": "external",
"summary": "SUSE Bug 1146572 for CVE-2019-15145",
"url": "https://bugzilla.suse.com/1146572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:djvulibre-doc-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre-devel-3.5.27-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.i586",
"openSUSE Leap 15.0:libdjvulibre21-3.5.27-lp150.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-30T04:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2019-15145"
}
]
}
CNVD-2019-29361
Vulnerability from cnvd - Published: 2019-08-29
VLAI Severity ?
Title
DjVuLibre缓冲区溢出漏洞(CNVD-2019-29361)
Description
DjVuLibre是一款DjVu(计算机文件格式)的开源实现,它包括DjVu文件查看器、浏览器插件、DjVu文件解码/编码器和其它实用程序。
DjVuLibre 3.5.27版本中存在缓冲区溢出漏洞,该漏洞源于libdjvu/GBitmap.h文件未能进行零字节检查,攻击者可通过构建JB2图像文件利用该漏洞造成拒绝服务(应用程序崩溃)。
Severity
中
Patch Name
DjVuLibre缓冲区溢出漏洞(CNVD-2019-29361)的补丁
Patch Description
DjVuLibre是一款DjVu(计算机文件格式)的开源实现,它包括DjVu文件查看器、浏览器插件、DjVu文件解码/编码器和其它实用程序。
DjVuLibre 3.5.27版本中存在缓冲区溢出漏洞,该漏洞源于libdjvu/GBitmap.h文件未能进行零字节检查,攻击者可通过构建JB2图像文件利用该漏洞造成拒绝服务(应用程序崩溃)。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://sourceforge.net/p/djvu/bugs/298/
Reference
https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/
https://sourceforge.net/p/djvu/bugs/298/
https://nvd.nist.gov/vuln/detail/CVE-2019-15145
Impacted products
| Name | DjVuLibre DjVuLibre 3.5.27 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-15145"
}
},
"description": "DjVuLibre\u662f\u4e00\u6b3eDjVu\uff08\u8ba1\u7b97\u673a\u6587\u4ef6\u683c\u5f0f\uff09\u7684\u5f00\u6e90\u5b9e\u73b0\uff0c\u5b83\u5305\u62ecDjVu\u6587\u4ef6\u67e5\u770b\u5668\u3001\u6d4f\u89c8\u5668\u63d2\u4ef6\u3001DjVu\u6587\u4ef6\u89e3\u7801/\u7f16\u7801\u5668\u548c\u5176\u5b83\u5b9e\u7528\u7a0b\u5e8f\u3002\n\nDjVuLibre 3.5.27\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8elibdjvu/GBitmap.h\u6587\u4ef6\u672a\u80fd\u8fdb\u884c\u96f6\u5b57\u8282\u68c0\u67e5\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u6784\u5efaJB2\u56fe\u50cf\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\uff09\u3002",
"discovererName": "unknown",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://sourceforge.net/p/djvu/bugs/298/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-29361",
"openTime": "2019-08-29",
"patchDescription": "DjVuLibre\u662f\u4e00\u6b3eDjVu\uff08\u8ba1\u7b97\u673a\u6587\u4ef6\u683c\u5f0f\uff09\u7684\u5f00\u6e90\u5b9e\u73b0\uff0c\u5b83\u5305\u62ecDjVu\u6587\u4ef6\u67e5\u770b\u5668\u3001\u6d4f\u89c8\u5668\u63d2\u4ef6\u3001DjVu\u6587\u4ef6\u89e3\u7801/\u7f16\u7801\u5668\u548c\u5176\u5b83\u5b9e\u7528\u7a0b\u5e8f\u3002\r\n\r\nDjVuLibre 3.5.27\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8elibdjvu/GBitmap.h\u6587\u4ef6\u672a\u80fd\u8fdb\u884c\u96f6\u5b57\u8282\u68c0\u67e5\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u6784\u5efaJB2\u56fe\u50cf\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "DjVuLibre\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2019-29361\uff09\u7684\u8865\u4e01",
"products": {
"product": "DjVuLibre DjVuLibre 3.5.27"
},
"referenceLink": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/\r\nhttps://sourceforge.net/p/djvu/bugs/298/\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-15145",
"serverity": "\u4e2d",
"submitTime": "2019-08-18",
"title": "DjVuLibre\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2019-29361\uff09"
}
BDU:2021-05177
Vulnerability from fstec - Published: 18.08.2019
VLAI Severity ?
Title
Уязвимость библиотеки для просмотра, создания, редактирования DjVu-файлов DjVuLibre, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость библиотеки для просмотра, создания, редактирования DjVu-файлов DjVuLibre связана с отсутствием проверки нулевых байтов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании
Severity ?
Vendor
Сообщество свободного программного обеспечения, ООО «РусБИТех-Астра», AT&T Labs
Software Name
Debian GNU/Linux, Astra Linux Special Edition (запись в едином реестре российских программ №369), Astra Linux Special Edition для «Эльбрус» (запись в едином реестре российских программ №11156), DjVuLibre
Software Version
9 (Debian GNU/Linux), 1.6 «Смоленск» (Astra Linux Special Edition), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 8.1 «Ленинград» (Astra Linux Special Edition для «Эльбрус»), до 3.5.27 включительно (DjVuLibre), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition)
Possible Mitigations
Для Djvulibre:
Использование рекомендаций производителя: https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/
Для Debian:
Использование рекомендаций производителя: https://security-tracker.debian.org/tracker/CVE-2019-15145
Для Astra Linux:
Использование рекомендаций производителя:
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20211008SE16
https://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47
Для Astra Linux Special Edition для «Эльбрус» 8.1 «Ленинград»:
обновить пакет djvulibre до 3.5.27.1-7+deb9u2 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se81-bulletin-20230315SE81
Reference
https://nvd.nist.gov/vuln/detail/CVE-2019-15145
https://security-tracker.debian.org/tracker/CVE-2019-15145
https://sourceforge.net/p/djvu/bugs/298/
https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20211008SE16
https://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47
https://wiki.astralinux.ru/astra-linux-se81-bulletin-20230315SE81
CWE
CWE-125
{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, AT\u0026T Labs",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb), \u0434\u043e 3.5.27 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (DjVuLibre), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f Djvulibre:\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/\n\n\u0414\u043b\u044f Debian:\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://security-tracker.debian.org/tracker/CVE-2019-15145\n\n\u0414\u043b\u044f Astra Linux:\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20211008SE16\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47\n\n\u0414\u043b\u044f Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 djvulibre \u0434\u043e 3.5.27.1-7+deb9u2 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se81-bulletin-20230315SE81",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "18.08.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "13.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "27.10.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-05177",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-15145",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), DjVuLibre",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0434\u043b\u044f \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430, \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f, \u0440\u0435\u0434\u0430\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f DjVu-\u0444\u0430\u0439\u043b\u043e\u0432 DjVuLibre, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0437\u0430 \u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u044b\u043c\u0438 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0434\u043b\u044f \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430, \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f, \u0440\u0435\u0434\u0430\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f DjVu-\u0444\u0430\u0439\u043b\u043e\u0432 DjVuLibre \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043d\u0443\u043b\u0435\u0432\u044b\u0445 \u0431\u0430\u0439\u0442\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2019-15145\nhttps://security-tracker.debian.org/tracker/CVE-2019-15145\nhttps://sourceforge.net/p/djvu/bugs/298/\nhttps://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20211008SE16\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20230315SE81",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-125",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,3)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}
FKIE_CVE-2019-15145
Vulnerability from fkie_nvd - Published: 2019-08-18 19:15 - Updated: 2024-11-21 04:28
Severity ?
Summary
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/ | ||
| cve@mitre.org | https://security.gentoo.org/glsa/202007-36 | Third Party Advisory | |
| cve@mitre.org | https://sourceforge.net/p/djvu/bugs/298/ | Exploit, Third Party Advisory | |
| cve@mitre.org | https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/ | Patch, Third Party Advisory | |
| cve@mitre.org | https://usn.ubuntu.com/4198-1/ | Third Party Advisory | |
| cve@mitre.org | https://www.debian.org/security/2021/dsa-5032 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202007-36 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://sourceforge.net/p/djvu/bugs/298/ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/ | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4198-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-5032 | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| djvulibre_project | djvulibre | 3.5.27 | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| debian | debian_linux | 10.0 | |
| debian | debian_linux | 11.0 | |
| fedoraproject | fedora | 29 | |
| fedoraproject | fedora | 30 | |
| fedoraproject | fedora | 31 | |
| canonical | ubuntu_linux | 16.04 | |
| canonical | ubuntu_linux | 18.04 | |
| canonical | ubuntu_linux | 19.04 | |
| canonical | ubuntu_linux | 19.10 | |
| opensuse | leap | 15.0 | |
| opensuse | leap | 15.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.27:*:*:*:*:*:*:*",
"matchCriteriaId": "6174AF9B-0B0B-4602-A693-A775A541276B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h."
},
{
"lang": "es",
"value": "DjVuLibre versi\u00f3n 3.5.27, permite a atacantes causar un ataque de denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n por medio de una lectura fuera de l\u00edmites) mediante el dise\u00f1o de un archivo de imagen JB2 corrupto que es manejado inapropiadamente en la funci\u00f3n JB2Dict::JB2Codec::get_direct_context en el archivo libdjvu/JB2Image.h debido a una falta de comprobaci\u00f3n de cero bytes en el archivo libdjvu/GBitmap.h."
}
],
"id": "CVE-2019-15145",
"lastModified": "2024-11-21T04:28:09.390",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-08-18T19:15:10.387",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202007-36"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://sourceforge.net/p/djvu/bugs/298/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4198-1/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-5032"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202007-36"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://sourceforge.net/p/djvu/bugs/298/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4198-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-5032"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2019-15145
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-15145",
"description": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.",
"id": "GSD-2019-15145",
"references": [
"https://www.suse.com/security/cve/CVE-2019-15145.html",
"https://www.debian.org/security/2021/dsa-5032",
"https://ubuntu.com/security/CVE-2019-15145",
"https://advisories.mageia.org/CVE-2019-15145.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-15145"
],
"details": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.",
"id": "GSD-2019-15145",
"modified": "2023-12-13T01:23:38.538227Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15145",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sourceforge.net/p/djvu/bugs/298/",
"refsource": "MISC",
"url": "https://sourceforge.net/p/djvu/bugs/298/"
},
{
"name": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/",
"refsource": "MISC",
"url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/"
},
{
"name": "[debian-lts-announce] 20190829 [SECURITY] [DLA 1902-1] djvulibre security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html"
},
{
"name": "openSUSE-SU-2019:2217",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html"
},
{
"name": "openSUSE-SU-2019:2219",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html"
},
{
"name": "FEDORA-2019-67ff247aea",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/"
},
{
"name": "FEDORA-2019-b217f90c2a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/"
},
{
"name": "FEDORA-2019-7ca378f076",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/"
},
{
"name": "USN-4198-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4198-1/"
},
{
"name": "FEDORA-2019-f923712bab",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/"
},
{
"name": "FEDORA-2019-6bc8be9d84",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/"
},
{
"name": "GLSA-202007-36",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202007-36"
},
{
"name": "[debian-lts-announce] 20210526 [SECURITY] [DLA 2667-1] djvulibre security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html"
},
{
"name": "DSA-5032",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-5032"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:djvulibre_project:djvulibre:3.5.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15145"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sourceforge.net/p/djvu/bugs/298/",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://sourceforge.net/p/djvu/bugs/298/"
},
{
"name": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/9658b01431cd7ff6344d7787f855179e73fe81a7/"
},
{
"name": "[debian-lts-announce] 20190829 [SECURITY] [DLA 1902-1] djvulibre security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html"
},
{
"name": "openSUSE-SU-2019:2217",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00086.html"
},
{
"name": "openSUSE-SU-2019:2219",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00087.html"
},
{
"name": "FEDORA-2019-67ff247aea",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPMG3VY33XGMIKE6QDYIUVS6A7GNTHTK/"
},
{
"name": "FEDORA-2019-b217f90c2a",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYZTGKWY3NAKMIMTFYGN4ZO5XEQWPYRL/"
},
{
"name": "FEDORA-2019-7ca378f076",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7F7544WASYMOTFDR2WUEOQLN3ZEXNU4/"
},
{
"name": "USN-4198-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4198-1/"
},
{
"name": "FEDORA-2019-f923712bab",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUEME45HVGTMDOYODAZYQOGWSZ2CEFWZ/"
},
{
"name": "FEDORA-2019-6bc8be9d84",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JO65AWU7LEWNF6DDCZPRFTR2ZPP5XK6L/"
},
{
"name": "GLSA-202007-36",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202007-36"
},
{
"name": "[debian-lts-announce] 20210526 [SECURITY] [DLA 2667-1] djvulibre security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00022.html"
},
{
"name": "DSA-5032",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-5032"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-03-29T19:16Z",
"publishedDate": "2019-08-18T19:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…