Debian 10261 Published by

The following updates has been released for Debian GNU/Linux:

Debian GNU/Linux 7 Extended LTS:
ELA-157-1 djvulibre security update

Debian GNU/Linux 8 LTS:
DLA 1901-1: dovecot security update
DLA 1902-1: djvulibre security update
DLA 1903-1: subversion security update



ELA-157-1 djvulibre security update

Package: djvulibre
Version: 3.5.25.3-1+deb7u1
Related CVE: CVE-2019-15142 CVE-2019-15143 CVE-2019-15144 CVE-2019-15145

Hongxu Chen found several issues in djvulibre, a library and set of tools to handle images in the DjVu format. The issues are a heap-buffer-overflow, a stack-overflow, an infinite loop and an invalid read when working with crafted files as input.

For Debian 7 Wheezy, these problems have been fixed in version 3.5.25.3-1+deb7u1.

We recommend that you upgrade your djvulibre packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/

DLA 1901-1: dovecot security update

Package : dovecot
Version : 1:2.2.13-12~deb8u7
CVE ID : CVE-2019-11500


Nick Roessler and Rafi Rubin discovered that the IMAP and ManageSieve
protocol parsers in the Dovecot email server do not properly validate
input (both pre- and post-login). A remote attacker can take advantage
of this flaw to trigger out of bounds heap memory writes, leading to
information leaks or potentially the execution of arbitrary code.

For Debian 8 "Jessie", this problem has been fixed in version
1:2.2.13-12~deb8u7.

We recommend that you upgrade your dovecot packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

DLA 1902-1: djvulibre security update

Package : djvulibre
Version : 3.5.25.4-4+deb8u1
CVE ID : CVE-2019-15142 CVE-2019-15143 CVE-2019-15144
CVE-2019-15145

Hongxu Chen found several issues in djvulibre, a library and set of tools
to handle images in the DjVu format.

The issues are a heap-buffer-overflow, a stack-overflow, an infinite loop
and an invalid read when working with crafted files as input.


For Debian 8 "Jessie", these problems have been fixed in version
3.5.25.4-4+deb8u1.

We recommend that you upgrade your djvulibre packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

DLA 1903-1: subversion security update

Package : subversion
Version : 1.8.10-6+deb8u7
CVE ID : CVE-2018-11782 CVE-2019-0203

Several vulnerabilities were discovered in Subversion, a version control
system. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2018-11782

Ace Olszowka reported that the Subversion's svnserve server process
may exit when a well-formed read-only request produces a particular
answer, leading to a denial of service.

CVE-2019-0203

Tomas Bortoli reported that the Subversion's svnserve server process
may exit when a client sends certain sequences of protocol commands.
If the server is configured with anonymous access enabled this could
lead to a remote unauthenticated denial of service.

For Debian 8 "Jessie", these problems have been fixed in version
1.8.10-6+deb8u7.

We recommend that you upgrade your subversion packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS