[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1888-1] imagemagick security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : imagemagick
Version        : 8:6.8.9.9-5+deb8u17
CVE ID         : CVE-2019-12974 CVE-2019-13135 CVE-2019-13295 CVE-2019-13297 
                 CVE-2019-13304 CVE-2019-13305 CVE-2019-13306

Multiple vulnerabilities have been found in imagemagick, an image processing
toolkit.

CVE-2019-12974

    NULL pointer dereference in ReadPANGOImage and ReadVIDImage (coders/pango.c
    and coders/vid.c). This vulnerability might be leveraged by remote attackers
    to cause denial of service via crafted image data.

CVE-2019-13135

    Multiple use of uninitialized values in ReadCUTImage, UnpackWPG2Raster and
    UnpackWPGRaster (coders/wpg.c and coders/cut.c). These vulnerabilities might
    be leveraged by remote attackers to cause denial of service or unauthorized
    disclosure or modification of information via crafted image data.

CVE-2019-13295, CVE-2019-13297

    Multiple heap buffer over-reads in AdaptiveThresholdImage
    (magick/threshold.c). These vulnerabilities might be leveraged by remote
    attackers to cause denial of service or unauthorized disclosure or
    modification of information via crafted image data.

CVE-2019-13304, CVE-2019-13305, CVE-2019-13306

    Multiple stack buffer overflows in WritePNMImage (coders/pnm.c), leading to
    stack buffer over write up to ten bytes. Remote attackers might leverage
    these flaws to potentially perform code execution or denial of service.

For Debian 8 "Jessie", these problems have been fixed in version
8:6.8.9.9-5+deb8u17.

We recommend that you upgrade your imagemagick packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=edCG
-----END PGP SIGNATURE-----


Reply to: