[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3737-1] imagemagick security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3737-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                   Bastien Roucariès
February 22, 2024                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : imagemagick
Version        : 8:6.9.10.23+dfsg-2.1+deb10u6
CVE ID         : CVE-2023-1289 CVE-2023-5341 CVE-2023-34151

Imagemagick a graphical software suite for displaying, creating and
modifying images was vulnerable.

CVE-2023-1289

    A vulnerability was discovered
    in ImageMagick where a specially created SVG file
    loads itself and causes a segmentation fault.
    This flaw allows a remote attacker to pass a
    specially crafted SVG file that leads to a segmentation
    fault, generating many trash files in "/tmp," resulting in
    a denial of service. When ImageMagick crashes, it generates
    a lot of trash files. These trash files can be large if the
    SVG file contains many render actions.

CVE-2023-5341

    A heap use-after-free flaw was found in coders/bmp.c

CVE-2023-34151

    A vulnerability was found in ImageMagick,
    due to undefined behaviors of casting double to size_t in
    svg, mvg and other coders

Moreover a few potential security problems were fixed in the
TIFF coders like for instance memory leaks. These issues were
unfortunatly CVE less. CVE-2023-39978 (a deny of service)
was also fixed by being introduced by partial fixes
of these problems.

For Debian 10 buster, these problems have been fixed in version
8:6.9.10.23+dfsg-2.1+deb10u6.

We recommend that you upgrade your imagemagick packages.

For the detailed security status of imagemagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/imagemagick

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=fBnL
-----END PGP SIGNATURE-----


Reply to: