- security update
- added patches fix CVE-2021-3500 [bsc#1186253], Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file + djvulibre-CVE-2021-3500.patch OBS-URL: https://build.opensuse.org/package/show/graphics/djvulibre?expand=0&rev=41
This commit is contained in:
parent
59430875c0
commit
4fc139368f
33
djvulibre-CVE-2021-3500.patch
Normal file
33
djvulibre-CVE-2021-3500.patch
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
--- a/libdjvu/DjVuPort.cpp
|
||||||
|
+++ a/libdjvu/DjVuPort.cpp
|
||||||
|
@@ -507,10 +507,19 @@ GP<DjVuFile>
|
||||||
|
DjVuPortcaster::id_to_file(const DjVuPort * source, const GUTF8String &id)
|
||||||
|
{
|
||||||
|
GPList<DjVuPort> list;
|
||||||
|
+
|
||||||
|
+ if (!!opening_id && opening_id == id)
|
||||||
|
+ G_THROW( ERR_MSG("DjVuPortcaster.recursive_open") );
|
||||||
|
+ else
|
||||||
|
+ opening_id = id;
|
||||||
|
+
|
||||||
|
compute_closure(source, list, true);
|
||||||
|
GP<DjVuFile> file;
|
||||||
|
for(GPosition pos=list;pos;++pos)
|
||||||
|
if ((file=list[pos]->id_to_file(source, id))) break;
|
||||||
|
+
|
||||||
|
+ opening_id = GUTF8String();
|
||||||
|
+
|
||||||
|
return file;
|
||||||
|
}
|
||||||
|
|
||||||
|
--- a/libdjvu/DjVuPort.h
|
||||||
|
+++ a/libdjvu/DjVuPort.h
|
||||||
|
@@ -484,6 +484,7 @@ private:
|
||||||
|
const DjVuPort *dst, int distance);
|
||||||
|
void compute_closure(const DjVuPort *src, GPList<DjVuPort> &list,
|
||||||
|
bool sorted=false);
|
||||||
|
+ GUTF8String opening_id;
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -1,3 +1,11 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon May 24 08:55:21 UTC 2021 - pgajdos@suse.com
|
||||||
|
|
||||||
|
- security update
|
||||||
|
- added patches
|
||||||
|
fix CVE-2021-3500 [bsc#1186253], Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file
|
||||||
|
+ djvulibre-CVE-2021-3500.patch
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Wed May 12 10:09:21 UTC 2021 - pgajdos@suse.com
|
Wed May 12 10:09:21 UTC 2021 - pgajdos@suse.com
|
||||||
|
|
||||||
|
@ -35,6 +35,8 @@ Patch1: djvulibre-CVE-2021-32491.patch
|
|||||||
Patch2: djvulibre-CVE-2021-32492.patch
|
Patch2: djvulibre-CVE-2021-32492.patch
|
||||||
# CVE-2021-32493 [bsc#1185905], Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
|
# CVE-2021-32493 [bsc#1185905], Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
|
||||||
Patch3: djvulibre-CVE-2021-32493.patch
|
Patch3: djvulibre-CVE-2021-32493.patch
|
||||||
|
# CVE-2021-3500 [bsc#1186253], Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file
|
||||||
|
Patch4: djvulibre-CVE-2021-3500.patch
|
||||||
BuildRequires: fdupes
|
BuildRequires: fdupes
|
||||||
BuildRequires: gcc-c++
|
BuildRequires: gcc-c++
|
||||||
BuildRequires: hicolor-icon-theme
|
BuildRequires: hicolor-icon-theme
|
||||||
@ -91,6 +93,7 @@ This package contains the documentation.
|
|||||||
%patch1 -p1
|
%patch1 -p1
|
||||||
%patch2 -p1
|
%patch2 -p1
|
||||||
%patch3 -p1
|
%patch3 -p1
|
||||||
|
%patch4 -p1
|
||||||
|
|
||||||
%build
|
%build
|
||||||
# configure script missing; generate using autogen.sh
|
# configure script missing; generate using autogen.sh
|
||||||
|
Loading…
Reference in New Issue
Block a user