[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1TKAVM-0003s1-At@titan.mandriva.com>
Date: Fri, 05 Oct 2012 18:12:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2012:160 ] imagemagick
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2012:160
http://www.mandriva.com/security/
_______________________________________________________________________
Package : imagemagick
Date : October 5, 2012
Affected: 2011., Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A vulnerability has been found and corrected in imagemagick:
The Magick_png_malloc function in coders/png.c in ImageMagick 6.7.8-6
does not use the proper variable type for the allocation size, which
might allow remote attackers to cause a denial of service (crash)
via a crafted PNG file that triggers incorrect memory allocation
(CVE-2012-3437).
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3437
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2011:
e3c76bded9a774eea31a8e6fe670f9b6 2011/i586/imagemagick-6.7.0.9-1.2-mdv2011.0.i586.rpm
e0850b9c33271801e880cc8f34aba0d6 2011/i586/imagemagick-desktop-6.7.0.9-1.2-mdv2011.0.i586.rpm
9d763cf168f088cd295b8dfec0e6c850 2011/i586/imagemagick-doc-6.7.0.9-1.2-mdv2011.0.i586.rpm
89354e093083f69a2ece10439eb9a89c 2011/i586/libmagick4-6.7.0.9-1.2-mdv2011.0.i586.rpm
026e039ee1b2428e3987744d8c0fe132 2011/i586/libmagick-devel-6.7.0.9-1.2-mdv2011.0.i586.rpm
ba14a74f5902c7369280ff15d005c42d 2011/i586/perl-Image-Magick-6.7.0.9-1.2-mdv2011.0.i586.rpm
5456e1d122ec21656f07053d35aaee97 2011/SRPMS/imagemagick-6.7.0.9-1.2.src.rpm
Mandriva Linux 2011/X86_64:
f926991c5980ac2c39ebe4527868c1af 2011/x86_64/imagemagick-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
1e0deadb027234db5e6a1471771daa2e 2011/x86_64/imagemagick-desktop-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
ee861a0cf7dba66e042d9b8f0fd70eda 2011/x86_64/imagemagick-doc-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
b2a886844058051f141fe15a6e53ff16 2011/x86_64/lib64magick4-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
1f8e6c539b1877742f8e64bfdcecbc4d 2011/x86_64/lib64magick-devel-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
2656e1a7b20dd77dd1deea52863e60f0 2011/x86_64/perl-Image-Magick-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
5456e1d122ec21656f07053d35aaee97 2011/SRPMS/imagemagick-6.7.0.9-1.2.src.rpm
Mandriva Enterprise Server 5:
f3aba495ee3a944e4e9ccafdfffac131 mes5/i586/imagemagick-6.4.2.10-5.4mdvmes5.2.i586.rpm
ba1858f1faf3c7e159ec8eebf558411a mes5/i586/imagemagick-desktop-6.4.2.10-5.4mdvmes5.2.i586.rpm
74a73593b07d82332f9ed7a77a3317f7 mes5/i586/imagemagick-doc-6.4.2.10-5.4mdvmes5.2.i586.rpm
4d5d5b4b7de7dcb477e317ee9604c0c1 mes5/i586/libmagick1-6.4.2.10-5.4mdvmes5.2.i586.rpm
cae27a3fa3c1abfcac6495152622149d mes5/i586/libmagick-devel-6.4.2.10-5.4mdvmes5.2.i586.rpm
9d892e3973d374a879ad033ac5a2fada mes5/i586/perl-Image-Magick-6.4.2.10-5.4mdvmes5.2.i586.rpm
98692ccd382085f7419e70475051173b mes5/SRPMS/imagemagick-6.4.2.10-5.4mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
cd0ff0a94a6e5aae6e205f7a28c68da3 mes5/x86_64/imagemagick-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
39046fb7ab97f63c6df0973a40fae4ce mes5/x86_64/imagemagick-desktop-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
c63eca56b0a188f49f0584899e512049 mes5/x86_64/imagemagick-doc-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
03608e7eb8ba79563d091178b5de3b60 mes5/x86_64/lib64magick1-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
363f3f3375150377ada47a9f6be761b4 mes5/x86_64/lib64magick-devel-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
17bd98545b888e9d0a1c8e31058fea34 mes5/x86_64/perl-Image-Magick-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
98692ccd382085f7419e70475051173b mes5/SRPMS/imagemagick-6.4.2.10-5.4mdvmes5.2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFQbtqVmqjQ0CJFipgRAhYQAKDpLs02NTNkWBB63fg5bvubjTD4ygCeN3Bw
IQrU5w9Z06DMH2yFX4mPmdY=
=/48G
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists