[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1619-1] graphicsmagick security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : graphicsmagick
Version        : 1.3.20-3+deb8u5
CVE ID         : CVE-2018-20184 CVE-2018-20185 CVE-2018-20189
Debian Bug     : 916752 916719 916721

Multiple vulnerabilities have been found in GraphicsMagick, the image
processing system.

CVE-2018-20184

    The WriteTGAImage function (tga.c) is affected by a heap-based buffer
    overflow. Remote attackers might leverage this vulnerability to cause
    a denial of service via a crafted image file.

CVE-2018-20185

    The ReadBMPImage function (bmp.c) is affected by a heap-based buffer
    over-read. Remote attackers might leverage this vulnerability to cause
    a denial of service via a crafted image file.

CVE-2018-20189

    The ReadDIBImage function (coders/dib.c) is affected by an assertion
    error. Remote attackers might leverage this vulnerability to cause
    a denial of service via a crafted image file.

For Debian 8 "Jessie", these problems have been fixed in version
1.3.20-3+deb8u5.

We recommend that you upgrade your graphicsmagick packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEUFZhdgIWqBhwqCvuZYVUZx9w0DQFAlwk1jMACgkQZYVUZx9w
0DQP/wf+LCE2kx897d4LwosqAQROdO/Dr01v0KDm9Jvc+qMahL9HEFDSkWT5uxxX
3llovYRgxbFBCtwwfQ5etWFge5GuUOHeBKzh2x5d+5Ml/FzVfPbocR1ou2avKHi4
4jlb6QbV+dvqnpGrkgzPUkix65RcgV4nVS7XbpNAs07BzADnH97MXjK1MPBqnPTA
7VY5Z4OXfrjcw7U3ZI1VZtjNRS5A8BX5pWGJ1CV/9hLLkwb3WY/MR3MTlZMQ97XJ
mY07PZJyGEJNwi16Q/77Mvsen2MoGSCz+rxjvoBtH7S+3kY1pU8rdeuHwhorr4Tp
j5U/1ndWtlbKSkZzqjGn35thyFTisw==
=MAph
-----END PGP SIGNATURE-----


Reply to: