DjVuLibre was found to have a vulnerability, where it incorrectly handled certain memory operations, which could be exploited by an attacker via a specially crafted DjVu (.djv) file, which when executed by the user or an automated system, could lead to crashing of the application (DoS) or possibly execute arbitrary code. The issue is said to be fixed in DjVuLibre 3.5.25.3. References: http://www.ubuntu.com/usn/usn-2056-1/
Created djvulibre tracking bugs for this issue: Affects: epel-6 [bug 1043823]
djvulibre-3.5.25.3-11.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.