First published: Fri Mar 26 2021(Updated: )
A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file may lead to application crash and other consequences.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/djvulibre | 3.5.27.1-10+deb10u1 3.5.28-2 | |
Djvulibre Project Djvulibre | <=3.5.28 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-32492 is high with a CVSS score of 7.8.
CVE-2021-32492 affects djvulibre versions 3.5.28 and earlier.
An out of bounds read in djvulibre can be exploited via a crafted djvu file, leading to application crash and other consequences.
Yes, there are fixes available for CVE-2021-32492 in djvulibre versions 3.5.27.1-10+deb10u1 and 3.5.28-2.
You can find more information about CVE-2021-32492 on the following references: [1] [2] [3]