AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Djvu djvulibre12/31/2023 ![]() creating a DjVu file is quicker than uploading hundreds of bitmap files.only one single file needs to be copied, compared to hundreds of pages in bitmap format.every page can be used in the "page" space.all pages can be seen from the file page of the DjVu file.all pages of a book are available on a single file.The aim is to create a DjVu file from bitmap versions ( jpg, tif, etc.) found on Internet or scanned. 4.2 Converting PostScript files (PDF, PS, EPS).For the stable distribution (bullseye), these problems have been fixed in version 3.5.28-2. ![]() (CVE-2021-3630) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. This flaw affects DjVuLibre versions prior to 3.5.28. ![]() (CVE-2021-3500) - An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file which may lead to crash and segmentation fault. ![]() A Stack overflow in function DJVU::DjVuDocument::get_djvu_file() via crafted djvu file may lead to application crash and other consequences. A heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file may lead to application crash and other consequences. An out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file may lead to application crash and other consequences. An integer overflow in function render() in tools/ddjvu via crafted djvu file may lead to application crash and other consequences. An out of bounds write in function DJVU::filter_bv() via crafted djvu file may lead to application crash and other consequences. (CVE-2019-15145) - DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp. (CVE-2019-15144) - DjVuLibre 3.5.27 allows attackers to cause a denial-of-service attack (application crash via an out-of- bounds read) by crafting a corrupted JB2 image file that is mishandled in JB2Dict::JB2Codec::get_direct_context in libdjvu/JB2Image.h because of a missing zero-bytes check in libdjvu/GBitmap.h. (CVE-2019-15143) - In DjVuLibre 3.5.27, the sorting functionality (aka GArrayTemplate::sort) allows attackers to cause a denial-of-service (application crash due to an Uncontrolled Recursion) by crafting a PBM image file that is mishandled in libdjvu/GContainer.h. (CVE-2019-15142) - In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp. In DjVuLibre 3.5.27, DjVmDir.cpp in the DJVU reader component allows attackers to cause a denial-of- service (application crash in GStringRep::strdup in libdjvu/GString.cpp caused by a heap-based buffer over-read) by crafting a DJVU file. Description The remote Debian 10 / 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-5032 advisory. Synopsis The remote Debian host is missing one or more security-related updates.
0 Comments
Read More
Leave a Reply. |