Debian: DSA-4321-1: graphicsmagick security update

    Date16 Oct 2018
    CategoryDebian
    6608
    Posted ByAnthony Pell
    Several vulnerabilities have been discovered in GraphicsMagick, a set of command-line applications to manipulate image files, which could result in denial of service or the execution of arbitrary code if malformed image files are processed.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4321-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                       Moritz Muehlenhoff
    October 16, 2018                      https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : graphicsmagick
    CVE ID         : CVE-2017-10794 CVE-2017-10799 CVE-2017-10800 CVE-2017-11102 
                     CVE-2017-11139 CVE-2017-11140 CVE-2017-11403 CVE-2017-11636 
                     CVE-2017-11637 CVE-2017-11638 CVE-2017-11641 CVE-2017-11642 
                     CVE-2017-11643 CVE-2017-11722 CVE-2017-12935 CVE-2017-12936 
                     CVE-2017-12937 CVE-2017-13063 CVE-2017-13064 CVE-2017-13065 
                     CVE-2017-13134 CVE-2017-13737 CVE-2017-13775 CVE-2017-13776 
                     CVE-2017-13777 CVE-2017-14314 CVE-2017-14504 CVE-2017-14733 
                     CVE-2017-14994 CVE-2017-14997 CVE-2017-15238 CVE-2017-15277 
                     CVE-2017-15930 CVE-2017-16352 CVE-2017-16353 CVE-2017-16545 
                     CVE-2017-16547 CVE-2017-16669 CVE-2017-17498 CVE-2017-17500 
                     CVE-2017-17501 CVE-2017-17502 CVE-2017-17503 CVE-2017-17782 
                     CVE-2017-17783 CVE-2017-17912 CVE-2017-17913 CVE-2017-17915 
                     CVE-2017-18219 CVE-2017-18220 CVE-2017-18229 CVE-2017-18230 
                     CVE-2017-18231 CVE-2018-5685 CVE-2018-6799 CVE-2018-9018
    
    Several vulnerabilities have been discovered in GraphicsMagick, a set of
    command-line applications to manipulate image files, which could result
    in denial of service or the execution of arbitrary code if malformed
    image files are processed.
    
    For the stable distribution (stretch), these problems have been fixed in
    version 1.3.30+hg15796-1~deb9u1.
    
    We recommend that you upgrade your graphicsmagick packages.
    
    For the detailed security status of graphicsmagick please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/graphicsmagick
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"8","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":21.43,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"3","type":"x","order":"3","pct":21.43,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.