Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:3755-1

Опубликовано: 25 сент. 2023
Источник: suse-cvrf

Описание

Security update for djvulibre

This update for djvulibre fixes the following issues:

  • CVE-2021-46310: Fixed divide by zero in IW44Image.cpp (bsc#1214670).
  • CVE-2021-46312: Fixed divide by zero in IW44EncodeCodec.cpp (bsc#1214672).
  • CVE-2021-32490: Fixed out of bounds write in function DJVU:filter_bv() via crafted djvu file (bsc#1185895).

Список пакетов

SUSE Linux Enterprise Server 12 SP5
libdjvulibre21-3.5.25.3-5.22.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
libdjvulibre21-3.5.25.3-5.22.1
SUSE Linux Enterprise Software Development Kit 12 SP5
libdjvulibre-devel-3.5.25.3-5.22.1

Описание

A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds write in function DJVU::filter_bv() via crafted djvu file may lead to application crash and other consequences.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5:libdjvulibre21-3.5.25.3-5.22.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5:libdjvulibre21-3.5.25.3-5.22.1
SUSE Linux Enterprise Software Development Kit 12 SP5:libdjvulibre-devel-3.5.25.3-5.22.1

Ссылки

Описание

An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in allows attackers to cause a denial of service via divide by zero.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5:libdjvulibre21-3.5.25.3-5.22.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5:libdjvulibre21-3.5.25.3-5.22.1
SUSE Linux Enterprise Software Development Kit 12 SP5:libdjvulibre-devel-3.5.25.3-5.22.1

Ссылки

Описание

An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in allows attackers to cause a denial of service via divide by zero.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5:libdjvulibre21-3.5.25.3-5.22.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5:libdjvulibre21-3.5.25.3-5.22.1
SUSE Linux Enterprise Software Development Kit 12 SP5:libdjvulibre-devel-3.5.25.3-5.22.1

Ссылки