First published: Thu Nov 21 2019(Updated: )
It was discovered that DjVuLibre incorrectly handled certain memory operations. If a user or automated system were tricked into processing a specially crafted DjVu file, a remote attacker could cause applications to hang or crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libdjvulibre21 | <3.5.27.1-13ubuntu0.1 | 3.5.27.1-13ubuntu0.1 |
=19.10 | ||
All of | ||
ubuntu/libdjvulibre21 | <3.5.27.1-10ubuntu0.1 | 3.5.27.1-10ubuntu0.1 |
=19.04 | ||
All of | ||
ubuntu/libdjvulibre21 | <3.5.27.1-8ubuntu0.1 | 3.5.27.1-8ubuntu0.1 |
=18.04 | ||
All of | ||
ubuntu/libdjvulibre21 | <3.5.27.1-5ubuntu0.1 | 3.5.27.1-5ubuntu0.1 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for DjVuLibre vulnerabilities is USN-4198-1.
The severity of USN-4198-1 is not mentioned in the description.
A remote attacker can exploit USN-4198-1 by tricking a user or automated system into processing a specially crafted DjVu file, leading to a denial of service or possible execution of arbitrary code.
The affected versions of libdjvulibre21 are 3.5.27.1-13ubuntu0.1, 3.5.27.1-10ubuntu0.1, 3.5.27.1-8ubuntu0.1, and 3.5.27.1-5ubuntu0.1.
The vulnerability in DjVuLibre can be fixed by applying the relevant security updates, such as libdjvulibre21 version 3.5.27.1-13ubuntu0.1.