[SECURITY] [DSA 4640-1] graphicsmagick security update








-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4640-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 15, 2020                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : graphicsmagick
CVE ID         : CVE-2019-19950 CVE-2019-19951 CVE-2019-19953 CVE-2019-11474
                 CVE-2019-11473 CVE-2019-11506 CVE-2019-11505 CVE-2019-11010
                 CVE-2019-11009 CVE-2019-11008 CVE-2019-11007 CVE-2019-11006
                 CVE-2019-11005 CVE-2018-20189 CVE-2018-20185 CVE-2018-20184

This update fixes several vulnerabilities in Graphicsmagick: Various memory
handling problems and cases of missing or incomplete input sanitising
may result in denial of service, memory disclosure or the execution
of arbitrary code if malformed media files are processed.

For the oldstable distribution (stretch), these problems have been fixed
in version 1.3.30+hg15796-1~deb9u3.

For the stable distribution (buster), these problems have been fixed in
version 1.4~hg15978-1+deb10u1.

We recommend that you upgrade your graphicsmagick packages.

For the detailed security status of graphicsmagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/graphicsmagick

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=eDkE
-----END PGP SIGNATURE-----




Reply to:




Source link

You must be logged in to post a comment.