-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.4946
                           qpdf security update
                              30 August 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           qpdf
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-36978 CVE-2021-25786 CVE-2018-18020

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2023/08/msg00037.html

Comment: CVSS (Max):  8.8 CVE-2021-25786 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: NIST
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-3548-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Thorsten Alteholz
August 29, 2023                               https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : qpdf
Version        : 8.4.0-2+deb10u1
CVE ID         : CVE-2018-18020 CVE-2021-25786 CVE-2021-36978


Several issues have been found in qpdf, a package with tools for 
transforming and inspecting PDF files.
Crafted files may enable remote attackers to execute arbitrary code or 
create recursive calls for a long time, which causes a denial of service.
Further a heap-based buffer overflow might occur when a certain downstream 
write fails.


For Debian 10 buster, these problems have been fixed in version
8.4.0-2+deb10u1.

We recommend that you upgrade your qpdf packages.

For the detailed security status of qpdf please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/qpdf

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=XF8F
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=0n2T
-----END PGP SIGNATURE-----