Debian: DSA-4640-1: graphicsmagick security update
Debian: DSA-4640-1: graphicsmagick security update
This update fixes several vulnerabilities in Graphicsmagick: Various memory handling problems and cases of missing or incomplete input sanitising may result in denial of service, memory disclosure or the execution of arbitrary code if malformed media files are processed.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4640-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Moritz Muehlenhoff March 15, 2020 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : graphicsmagick CVE ID : CVE-2019-19950 CVE-2019-19951 CVE-2019-19953 CVE-2019-11474 CVE-2019-11473 CVE-2019-11506 CVE-2019-11505 CVE-2019-11010 CVE-2019-11009 CVE-2019-11008 CVE-2019-11007 CVE-2019-11006 CVE-2019-11005 CVE-2018-20189 CVE-2018-20185 CVE-2018-20184 This update fixes several vulnerabilities in Graphicsmagick: Various memory handling problems and cases of missing or incomplete input sanitising may result in denial of service, memory disclosure or the execution of arbitrary code if malformed media files are processed. For the oldstable distribution (stretch), these problems have been fixed in version 1.3.30+hg15796-1~deb9u3. For the stable distribution (buster), these problems have been fixed in version 1.4~hg15978-1+deb10u1. We recommend that you upgrade your graphicsmagick packages. For the detailed security status of graphicsmagick please refer to its security tracker page at: https://security-tracker.debian.org/tracker/graphicsmagick Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.