First published: Fri Mar 26 2021(Updated: )
A flaw was found in djvulibre-3.5.28 and earlier. A heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file may lead to application crash and other consequences.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/djvulibre | 3.5.27.1-10+deb10u1 3.5.28-2 | |
ubuntu/libdjvulibre-text | <=3.5.28 | |
Debian | =10.0 | |
Debian | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32493 is a vulnerability in djvulibre-3.5.28 and earlier versions that allows a crafted djvu file to cause a heap buffer overflow, potentially leading to application crashes and other consequences.
CVE-2021-32493 has a severity rating of 7.8, which is considered high.
The affected software includes djvulibre-3.5.28 and earlier versions.
To fix CVE-2021-32493, it is recommended to update your djvulibre package to version 3.5.28-2 or apply the provided patches for the affected versions.
You can find more information about CVE-2021-32493 on Red Hat Bugzilla, SourceForge, and the Debian Security Tracker.