Source: djvulibre Version: 3.5.28-2 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for djvulibre. CVE-2025-53367[0]: | DjVuLibre is a GPL implementation of DjVu, a web-centric format for | distributing documents and images. Prior to version 3.5.29, the | MMRDecoder::scanruns method is affected by an OOB-write | vulnerability, because it does not check that the xr pointer stays | within the bounds of the allocated buffer. This can lead to writes | beyond the allocated memory, resulting in a heap corruption | condition. An out-of-bounds read with pr is also possible for the | same reason. This issue has been patched in version 3.5.29. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-53367 https://www.cve.org/CVERecord?id=CVE-2025-53367 [1] https://sourceforge.net/p/djvu/djvulibre-git/ci/33f645196593d70bd5e37f55b63886c31c82c3da/ [2] https://www.openwall.com/lists/oss-security/2025/07/03/1 Please adjust the affected versions in the BTS as needed. Regards, Salvatore