Linux Security
    Linux Security
    Linux Security

    Debian: New imagemagick packages fix several vulnerabilities

    Date 19 Nov 2006
    Posted By LinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1213-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                         Moritz Muehlenhoff
    November 19th, 2006           
    - --------------------------------------------------------------------------
    Package        : imagemagick
    Vulnerability  : several
    Problem-Type   : local(remote)
    Debian-specific: no
    CVE ID         : CVE-2006-0082 CVE-2006-4144 CVE-2006-5456 CVE-2006-5868
    Debian Bug     : 345876 383314 393025
    Several remote vulnerabilities have been discovered in Imagemagick,
    a collection of image manipulation programs, which may lead to the
    execution of arbitrary code. The Common Vulnerabilities and Exposures
    project identifies the following problems:
        Daniel Kobras discovered that Imagemagick is vulnerable to format
        string attacks in the filename parsing code.
        Damian Put discovered that Imagemagick is vulnerable to buffer
        overflows in the module for SGI images.
        M Joonas Pihlaja discovered that Imagemagick is vulnerable to buffer
        overflows in the module for DCM and PALM images.
        Daniel Kobras discovered that Imagemagick is vulnerable to buffer
        overflows in the module for SGI images.
    This update also adresses regressions in the XCF codec, which were
    introduced in the previous security update.
    For the stable distribution (sarge) these problems have been fixed in
    version 6:
    For the upcoming stable distribution (etch) these problems have been
    fixed in version 7:
    For the unstable distribution (sid) these problems have been fixed in
    version 7:
    We recommend that you upgrade your imagemagick packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      881 0f3c7174962dcaf0be7b3027312d3438
          Size/MD5 checksum:   142001 c2be91d527c1714ee0ece93b090792c7
          Size/MD5 checksum:  6824001 477a361ba0154cc2423726fab4a3f57c
      Alpha architecture:
          Size/MD5 checksum:  1469720 b311ede0075f36157e9c9c244a382cb6
          Size/MD5 checksum:   173974 34306082902f34914d4d0823f0e153c8
          Size/MD5 checksum:   288800 fa2b7d2ad5708e66fbc5c14f830bace0
          Size/MD5 checksum:  1285588 cabe582c14962459c8bc8dffc7d3a516
          Size/MD5 checksum:  2204442 080e9f6d25c7b1f1df10dd1828f85273
          Size/MD5 checksum:   143902 98099204464269c5386244cb1fee775f
      AMD64 architecture:
          Size/MD5 checksum:  1466352 d50a197f3c3f0e15f1530d56177a1c72
          Size/MD5 checksum:   163602 642d806539f42d3bd3645edb021bae16
          Size/MD5 checksum:   228744 9b7c462060e0769f1561da5dcfb32dee
          Size/MD5 checksum:  1194980 51182a82a05f1f47c435f246a21469ad
          Size/MD5 checksum:  1550348 43d9d80bd42b3dc6f6d611a997a17c2e
          Size/MD5 checksum:   231800 6375c61e8edc60fa928665cf45ec011c
      ARM architecture:
          Size/MD5 checksum:  1466148 a0c6fcb562afa6d5f8736beda4dade43
          Size/MD5 checksum:   149342 9a184c8f6d3d204748ed30a1c57dbd1f
          Size/MD5 checksum:   234806 0d4865aaf1dd850604ce9b728e65def6
          Size/MD5 checksum:  1204646 02fbc1c7b8b98d1977e4861211f1255a
          Size/MD5 checksum:  1647698 cef197d1c2ce919413ab12bd1b99187a
          Size/MD5 checksum:   230484 5b5dbe487dc580a5f164cf862552ab4d
      HP Precision architecture:
          Size/MD5 checksum:  1468290 329777db0d2b061398268f9fd8d6a7a7
          Size/MD5 checksum:   182170 e190aad821d4e96ba2b84fc4d3b49da8
          Size/MD5 checksum:   273890 434201d0f53175e739ce45addbe2ce01
          Size/MD5 checksum:  1404728 cfe2739dac2b84497a00f92b5c4b36ad
          Size/MD5 checksum:  1827810 14e7e2febd80f1551cfa9b035ed9222c
          Size/MD5 checksum:   243804 e4bfc17d51547976f7f4db09f6cc6997
      Intel IA-32 architecture:
          Size/MD5 checksum:  1466106 0ee2e904990dbcbeee0b90c2fa95ac62
          Size/MD5 checksum:   164440 708d64c7a92419a98e7d305089b1b0c4
          Size/MD5 checksum:   208932 eed51be1f03a91e624194e9dea211ff2
          Size/MD5 checksum:  1172262 22f32c18dc71c7b24eff16f1fec1c243
          Size/MD5 checksum:  1507516 ea9e1148fa72e6be94462a46d30304b0
          Size/MD5 checksum:   233964 e47cbf76b993c0eb44adcf85e125d75c
      Intel IA-64 architecture:
          Size/MD5 checksum:  1468472 6b31e556cf944fe2d89ad8d2c09cc43a
          Size/MD5 checksum:   188272 7bf4012fe64aa60c8aac88b263b620c4
          Size/MD5 checksum:   295958 dcf1b145b868414bd2357d21ace70fb2
          Size/MD5 checksum:  1605554 7ab0f7944f25bbaca6266e3bce816132
          Size/MD5 checksum:  2132552 7324f4a81b5496cc7c9182ae2bb082fb
          Size/MD5 checksum:   273506 fa943563a08e04b06c0632afe7f4bc92
      Motorola 680x0 architecture:
          Size/MD5 checksum:  1466154 1f5c2b36763032352c2b45144517a5b8
          Size/MD5 checksum:   159998 624ebcd80f960f7227095411cbdfb90c
          Size/MD5 checksum:   210680 91b3bafec7f54823cb2720966fcc4825
          Size/MD5 checksum:  1073256 b7f77626db0631d990422a3cae43f517
          Size/MD5 checksum:  1288834 fd7af651e4d2d5124b45228d30dc6737
          Size/MD5 checksum:   226942 f097f5c845a1159029271cba7112141f
      Big endian MIPS architecture:
          Size/MD5 checksum:  1490232 6aff49b4b30fc146abde3fcbefe85d5f
          Size/MD5 checksum:   155500 416074125be015d5c49a90ac032c5182
          Size/MD5 checksum:   254800 b8f762578afa79b0210dec43547917a4
          Size/MD5 checksum:  1119320 6c778533f22c4f7e7c1dd268b5b59c3a
          Size/MD5 checksum:  1704446 6855a0354042ab9b283bc3966f4f665f
          Size/MD5 checksum:   131304 74185bb1115a3bcd50085df4fac2e50f
      Little endian MIPS architecture:
          Size/MD5 checksum:  1490202 bd3a8c344eb9927d656543c20d784f38
          Size/MD5 checksum:   151598 d903083280a2428e35516444c93c7d03
          Size/MD5 checksum:   250056 7c7c6a65f433eee855e775b2e4eafcf3
          Size/MD5 checksum:  1114750 13012fdd898b1aa77267f90b73563e50
          Size/MD5 checksum:  1667906 1aeb160d222b005e4103c715d964b0db
          Size/MD5 checksum:   130912 84b347ac516de3a89060c2e010a63cf0
      PowerPC architecture:
          Size/MD5 checksum:  1471774 5e218bb6d5e36cf50c80ebbf77a56abe
          Size/MD5 checksum:   156748 4564f4918218c6e6c60fe587fd25d118
          Size/MD5 checksum:   227722 5eba56a195be2aca1354fce454293a9f
          Size/MD5 checksum:  1169510 92e5f7ca8fdf727e3a88a48262219c8e
          Size/MD5 checksum:  1684852 dc528d0a8080493c028bfca9665dcca3
          Size/MD5 checksum:   270502 cc408c569b2ce9d03576b4bd9bcb0cb0
      IBM S/390 architecture:
          Size/MD5 checksum:  1467494 d1a9308491175f690a73f720caa7532b
          Size/MD5 checksum:   180486 6693ec2651a6f959a7f3f08efbeeea6f
          Size/MD5 checksum:   230182 93a55b0f22a8339b13e2816a970ca102
          Size/MD5 checksum:  1194334 e93c9333e1adc98bb7b99e6d2904d995
          Size/MD5 checksum:  1530886 db33e6bb01f6d927c02053f0cdd4bf89
          Size/MD5 checksum:   242114 51baccefbc53499f3514911521d76c76
      Sun Sparc architecture:
          Size/MD5 checksum:  1465694 d77c64a8e1c40678070a79011abcb8a5
          Size/MD5 checksum:   161036 dadfff14cc51b0fb9561bf6469b61a3e
          Size/MD5 checksum:   224332 c8ebb9dbff86871dc12e3d5ae275bc12
          Size/MD5 checksum:  1249156 461cd22009434968fd4011481ce01044
          Size/MD5 checksum:  1684366 00b473e9bf9e417a4f0bcff753ed727b
          Size/MD5 checksum:   230898 020b71df283f6391f3a15415be45a375
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.