
Cloud Vulnerability DB
A community-led vulnerabilities database
A flaw was discovered in djvulibre version 3.5.28 and earlier, identified as CVE-2021-32491. The vulnerability involves an integer overflow in the render() function within tools/ddjvu component that can be triggered via a crafted djvu file. This vulnerability was reported on March 26, 2021, and was assigned a CVSS 3.1 score of 7.8 (High) (Ubuntu Security).
The vulnerability is characterized by an integer overflow condition in the render() function specifically within the tools/ddjvu component. The issue received a CVSS 3.1 base score of 7.8 (High), with the following vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This indicates a local attack vector, low attack complexity, no privileges required, and user interaction is required. The scope is unchanged, but the impact on confidentiality, integrity, and availability is high (Ubuntu Security).
When successfully exploited, this vulnerability can lead to application crashes and potentially other unspecified consequences. The high CVSS score indicates significant potential impact on system confidentiality, integrity, and availability (Debian Security, Red Hat Bugzilla).
Multiple Linux distributions have released patches to address this vulnerability. Debian fixed the issue in version 3.5.27.1-10+deb10u1 for the oldstable distribution (buster) and version 3.5.28-2 for the stable distribution (bullseye). Ubuntu has also released fixes across multiple versions: 3.5.28-1ubuntu0.1 for 21.04, 3.5.27.1-15ubuntu0.1 for 20.10, 3.5.27.1-14ubuntu0.1 for 20.04 LTS, and 3.5.27.1-8ubuntu0.3 for 18.04 LTS (Debian Security, Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."