cvrf2cusa/cvrf/2021/cvrf-openEuler-SA-2021-1034.xml
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

259 lines
15 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for djvulibre is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2021-1034</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2021-02-07</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2021-02-07</InitialReleaseDate>
<CurrentReleaseDate>2021-02-07</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2021-02-07</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">djvulibre security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for djvulibre is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">DjVu is a set of compression technologies, a file format, and a software platform for the deliveryover the Web of digital documents, scanned documents, and high resolution images.DjVu documents download and display extremely quickly, and look exactly the same on all platforms with no compatibility problems due to fonts, colors, etc. DjVu can be seen as a superior alternative to PDF and PostScript for digital documents, to TIFF (and PDF) for scanned bitonal documents, to JPEG and JPEG2000 for photographs and pictures, and to GIF for large palettized images. DjVu is the only Web format that is practical for distributing high-resolution scanned documents in color.
Security Fix(es):
DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp.(CVE-2019-18804)
DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.(CVE-2019-15145)
In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.(CVE-2019-15142)
In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.(CVE-2019-15143)
In DjVuLibre 3.5.27, the sorting functionality allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.(CVE-2019-15144)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for djvulibre is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">djvulibre</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1034</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2019-18804</URL>
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2019-15145</URL>
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2019-15142</URL>
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2019-15143</URL>
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2019-15144</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-18804</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-15145</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-15142</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-15143</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-15144</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS" CPE="cpe:/a:openEuler:openEuler:20.03-LTS">openEuler-20.03-LTS</FullProductName>
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="djvulibre-help-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS">djvulibre-help-3.5.27-15.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-devel-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS">djvulibre-devel-3.5.27-15.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-debugsource-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS">djvulibre-debugsource-3.5.27-15.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS">djvulibre-3.5.27-15.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-debuginfo-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS">djvulibre-debuginfo-3.5.27-15.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-help-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">djvulibre-help-3.5.27-15.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-devel-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">djvulibre-devel-3.5.27-15.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-debugsource-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">djvulibre-debugsource-3.5.27-15.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">djvulibre-3.5.27-15.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-debuginfo-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">djvulibre-debuginfo-3.5.27-15.oe1.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="djvulibre-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS">djvulibre-3.5.27-15.oe1.src.rpm</FullProductName>
<FullProductName ProductID="djvulibre-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">djvulibre-3.5.27-15.oe1.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="djvulibre-devel-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS">djvulibre-devel-3.5.27-15.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-debugsource-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS">djvulibre-debugsource-3.5.27-15.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-debuginfo-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS">djvulibre-debuginfo-3.5.27-15.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-help-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS">djvulibre-help-3.5.27-15.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS">djvulibre-3.5.27-15.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-devel-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">djvulibre-devel-3.5.27-15.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-debugsource-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">djvulibre-debugsource-3.5.27-15.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-debuginfo-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">djvulibre-debuginfo-3.5.27-15.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-help-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">djvulibre-help-3.5.27-15.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="djvulibre-3.5.27-15" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">djvulibre-3.5.27-15.oe1.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp.</Note>
</Notes>
<ReleaseDate>2021-02-07</ReleaseDate>
<CVE>CVE-2019-18804</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS</ProductID>
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>djvulibre security update</Description>
<DATE>2021-02-07</DATE>
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1034</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of-bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h.</Note>
</Notes>
<ReleaseDate>2021-02-07</ReleaseDate>
<CVE>CVE-2019-15145</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS</ProductID>
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>6.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>djvulibre security update</Description>
<DATE>2021-02-07</DATE>
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1034</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of-service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file.</Note>
</Notes>
<ReleaseDate>2021-02-07</ReleaseDate>
<CVE>CVE-2019-15142</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS</ProductID>
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>6.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>djvulibre security update</Description>
<DATE>2021-02-07</DATE>
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1034</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.</Note>
</Notes>
<ReleaseDate>2021-02-07</ReleaseDate>
<CVE>CVE-2019-15143</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS</ProductID>
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>6.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>djvulibre security update</Description>
<DATE>2021-02-07</DATE>
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1034</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">In DjVuLibre 3.5.27, the sorting functionality allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h.</Note>
</Notes>
<ReleaseDate>2021-02-07</ReleaseDate>
<CVE>CVE-2019-15144</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS</ProductID>
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>6.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>djvulibre security update</Description>
<DATE>2021-02-07</DATE>
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1034</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>