[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA-3007-1] imagemagick security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3007-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                   Andreas Rönnquist
May 14, 2022                                  https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : imagemagick
Version        : 8:6.9.7.4+dfsg-11+deb9u14
CVE ID         : CVE-2021-3596 CVE-2022-28463

CVE-2021-3596

    A NULL pointer dereference flaw was found in
    ImageMagick in versions prior to 7.0.10-31 in ReadSVGImage() in
    coders/svg.c. This issue is due to not checking the return value from
    libxml2's xmlCreatePushParserCtxt() and uses the value directly, which
    leads to a crash and segmentation fault.

CVE-2022-28463

    ImageMagick is vulnerable to Buffer Overflow.

For Debian 9 stretch, these problems have been fixed in version
8:6.9.7.4+dfsg-11+deb9u14.

We recommend that you upgrade your imagemagick packages.

For the detailed security status of imagemagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/imagemagick

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=/Lkp
-----END PGP SIGNATURE-----


Reply to: