-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3291
                  [DLA 1902-1] djvulibre security update
                              30 August 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           djvulibre
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-15145 CVE-2019-15144 CVE-2019-15143
                   CVE-2019-15142  

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2019/08/msg00036.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running djvulibre check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : djvulibre
Version        : 3.5.25.4-4+deb8u1
CVE ID         : CVE-2019-15142 CVE-2019-15143 CVE-2019-15144
                  CVE-2019-15145


Hongxu Chen found several issues in djvulibre, a library and set of tools
to handle images in the DjVu format.

The issues are a heap-buffer-overflow, a stack-overflow, an infinite loop
and an invalid read when working with crafted files as input.


For Debian 8 "Jessie", these problems have been fixed in version
3.5.25.4-4+deb8u1.

We recommend that you upgrade your djvulibre packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=WOr0
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXWhgkWaOgq3Tt24GAQgJiA//bqxpU4sfMS7iMEJ7w9c4tPtXSQ6UuBd7
bKaZpTUTItCs+kXdq7fgt3oCuBcWJyvmCqCTmT33W7huMiJHq3cT2HxiuqEbiEpO
H4FDHgmDU/EOttbPar+Rnlvzm29oY6YbzK2GZdVDKW/eTAqzVCoUeDSfEwfbx5c1
wRkpvssh+UskptD11AIyF5uYMFjLxj7/crqJEp7XLqyLaBjNGX/FD6MLstLL9Y3N
KWUu2z5HRXofa9JkWuAeloNBb/9Ar+CBUThySiZibRW+dlAWkmZ9XlgySYpRXupx
fGFBXnrvPg7g8U15S39//SdjQPe4hYnQtTmbKGYqXTopNacMYhfABWeyn+i41KGH
jpLpGRkU8FI17qiqSO0cFISbb4XIzPtExd0TG/nFI8rxSrDNjujy2P5JqWGxfnIj
LctURaUeycSgfmtb0wLyIoFIExGY1QVCIt7m6Qy7FBF5Bmh0yj1JfJS493t3Fru3
adTdI1meW3yOh0C5Mh6BRZUh447jdzIZAdsYIvRLLMjXeUUh6p1GJ2AndS3iJYbZ
Q0CxV3cJYauH9T1xpDbIUsqdS0v4J+SntWXDeftFcOqEAdzTlTI+Q/zwoijlNyaD
iINP+uyRJ801PH8OBsVqBQUXNrheu5QSbs0XYoQLKf4wbiMA9AV90lzA+d5wBkJZ
qTZelRwItFc=
=wJjE
-----END PGP SIGNATURE-----