lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20190428194611.lkn2fpatoz3cegyg@seger.debian.org>
Date: Sun, 28 Apr 2019 19:46:11 +0000
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4436-1] imagemagick security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4436-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
April 28, 2019                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : imagemagick
CVE ID         : CVE-2019-9956 CVE-2019-10650

This update fixes two vulnerabilities in Imagemagick: Memory handling
problems and missing or incomplete input sanitising may result in denial
of service, memory disclosure or the execution of arbitrary code if
malformed TIFF or Postscript files are processed.
      
For the stable distribution (stretch), these problems have been fixed in
version 8:6.9.7.4+dfsg-11+deb9u7.

We recommend that you upgrade your imagemagick packages.

For the detailed security status of imagemagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/imagemagick

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=kPye
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ