The following updates has been released for Debian GNU/Linux:
Debian GNU/Linux 7 Extended LTS:
ELA-157-1 djvulibre security update
Debian GNU/Linux 8 LTS:
DLA 1901-1: dovecot security update
DLA 1902-1: djvulibre security update
DLA 1903-1: subversion security update
Debian GNU/Linux 7 Extended LTS:
ELA-157-1 djvulibre security update
Debian GNU/Linux 8 LTS:
DLA 1901-1: dovecot security update
DLA 1902-1: djvulibre security update
DLA 1903-1: subversion security update
ELA-157-1 djvulibre security update
Package: djvulibre
Version: 3.5.25.3-1+deb7u1
Related CVE: CVE-2019-15142 CVE-2019-15143 CVE-2019-15144 CVE-2019-15145
Hongxu Chen found several issues in djvulibre, a library and set of tools to handle images in the DjVu format. The issues are a heap-buffer-overflow, a stack-overflow, an infinite loop and an invalid read when working with crafted files as input.
For Debian 7 Wheezy, these problems have been fixed in version 3.5.25.3-1+deb7u1.
We recommend that you upgrade your djvulibre packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/
DLA 1901-1: dovecot security update
Package : dovecot
Version : 1:2.2.13-12~deb8u7
CVE ID : CVE-2019-11500
Nick Roessler and Rafi Rubin discovered that the IMAP and ManageSieve
protocol parsers in the Dovecot email server do not properly validate
input (both pre- and post-login). A remote attacker can take advantage
of this flaw to trigger out of bounds heap memory writes, leading to
information leaks or potentially the execution of arbitrary code.
For Debian 8 "Jessie", this problem has been fixed in version
1:2.2.13-12~deb8u7.
We recommend that you upgrade your dovecot packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DLA 1902-1: djvulibre security update
Package : djvulibre
Version : 3.5.25.4-4+deb8u1
CVE ID : CVE-2019-15142 CVE-2019-15143 CVE-2019-15144
CVE-2019-15145
Hongxu Chen found several issues in djvulibre, a library and set of tools
to handle images in the DjVu format.
The issues are a heap-buffer-overflow, a stack-overflow, an infinite loop
and an invalid read when working with crafted files as input.
For Debian 8 "Jessie", these problems have been fixed in version
3.5.25.4-4+deb8u1.
We recommend that you upgrade your djvulibre packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
DLA 1903-1: subversion security update
Package : subversion
Version : 1.8.10-6+deb8u7
CVE ID : CVE-2018-11782 CVE-2019-0203
Several vulnerabilities were discovered in Subversion, a version control
system. The Common Vulnerabilities and Exposures project identifies the
following problems:
CVE-2018-11782
Ace Olszowka reported that the Subversion's svnserve server process
may exit when a well-formed read-only request produces a particular
answer, leading to a denial of service.
CVE-2019-0203
Tomas Bortoli reported that the Subversion's svnserve server process
may exit when a client sends certain sequences of protocol commands.
If the server is configured with anonymous access enabled this could
lead to a remote unauthenticated denial of service.
For Debian 8 "Jessie", these problems have been fixed in version
1.8.10-6+deb8u7.
We recommend that you upgrade your subversion packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS