lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1DnMjt-0004HD-0K@mercury.mandriva.com>
Date: Tue Jun 28 21:31:32 2005
From: security at mandriva.com (Mandriva Security Team)
Subject: MDKSA-2005:107 - Updated ImageMagick packages fix
	vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                Mandriva Linux Security Update Advisory
 _______________________________________________________________________

 Package name:           ImageMagick
 Advisory ID:            MDKSA-2005:107
 Date:                   June 28th, 2005

 Affected versions:	 10.1, 10.2, Corporate 3.0,
			 Corporate Server 2.1
 ______________________________________________________________________

 Problem Description:

 A heap-based buffer overflow was found in the way that ImageMagick
 parses PNM files.  If an attacker can trick a victim into opening
 a specially crafted PNM file, the attacker could execute arbitrary
 code on the victim's machine (CAN-2005-1275).
 
 As well, a Denial of Service vulnerability was found in the way
 that ImageMagick parses XWD files.  If a user or program executed
 ImageMagick to process a malicious XWD file, ImageMagick will enter
 info an infinite loop causing a DoS (CAN-2005-1739).
 
 The updated packages have been patched to fix these issues.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1275
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1739
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.1:
 7204ab3971632313f7ae847da62af4c5  10.1/RPMS/ImageMagick-6.0.4.4-5.3.101mdk.i586.rpm
 bff95b521ea8c8e2a159495c25e51efc  10.1/RPMS/ImageMagick-doc-6.0.4.4-5.3.101mdk.i586.rpm
 d65c0c50a3d40ceac62bae4fe0088ecb  10.1/RPMS/libMagick6.4.0-6.0.4.4-5.3.101mdk.i586.rpm
 878c21b19aa7afebdaa779b9b3ef71d3  10.1/RPMS/libMagick6.4.0-devel-6.0.4.4-5.3.101mdk.i586.rpm
 5c5fc0b42c710313e8e6d42628ab70b5  10.1/RPMS/perl-Magick-6.0.4.4-5.3.101mdk.i586.rpm
 d68f51a677e771ae20b4ff91d1792773  10.1/SRPMS/ImageMagick-6.0.4.4-5.3.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 798ffe25847a9c9e0cc3592c9eb01860  x86_64/10.1/RPMS/ImageMagick-6.0.4.4-5.3.101mdk.x86_64.rpm
 ef92b2e22fa6ac4c9d39b84412d1f115  x86_64/10.1/RPMS/ImageMagick-doc-6.0.4.4-5.3.101mdk.x86_64.rpm
 e5653abbf08119cabba8535b6aa988d9  x86_64/10.1/RPMS/lib64Magick6.4.0-6.0.4.4-5.3.101mdk.x86_64.rpm
 c364fae31c3dd29641bda09bccf283fe  x86_64/10.1/RPMS/lib64Magick6.4.0-devel-6.0.4.4-5.3.101mdk.x86_64.rpm
 0a65d39ff4b976c45ace888f62c6a73e  x86_64/10.1/RPMS/perl-Magick-6.0.4.4-5.3.101mdk.x86_64.rpm
 d68f51a677e771ae20b4ff91d1792773  x86_64/10.1/SRPMS/ImageMagick-6.0.4.4-5.3.101mdk.src.rpm

 Mandrakelinux 10.2:
 9a9011f107558829fcb232fd85d556dc  10.2/RPMS/ImageMagick-6.2.0.3-8.1.102mdk.i586.rpm
 47c28aa693bd83166100451b958dd3b8  10.2/RPMS/ImageMagick-doc-6.2.0.3-8.1.102mdk.i586.rpm
 d0844c92f73aef8e29a12e2cc8c3d946  10.2/RPMS/libMagick8.0.2-6.2.0.3-8.1.102mdk.i586.rpm
 5c7640c27cea8164a42d5f3048c4aac3  10.2/RPMS/libMagick8.0.2-devel-6.2.0.3-8.1.102mdk.i586.rpm
 eecc10db3e0633056039b7e3b6c0269b  10.2/RPMS/perl-Image-Magick-6.2.0.3-8.1.102mdk.i586.rpm
 a0107084465ecdd25a967bc865282c8e  10.2/SRPMS/ImageMagick-6.2.0.3-8.1.102mdk.src.rpm

 Mandrakelinux 10.2/X86_64:
 6b7cc28d1fdb66d0eda4206f2b47deff  x86_64/10.2/RPMS/ImageMagick-6.2.0.3-8.1.102mdk.x86_64.rpm
 6864d0102bfb382d997c0325a80ba199  x86_64/10.2/RPMS/ImageMagick-doc-6.2.0.3-8.1.102mdk.x86_64.rpm
 5efd08cab8bbb20c4fb736f01d11aab0  x86_64/10.2/RPMS/lib64Magick8.0.2-6.2.0.3-8.1.102mdk.x86_64.rpm
 408fd0dd00b46295a7aff30dc5271c43  x86_64/10.2/RPMS/lib64Magick8.0.2-devel-6.2.0.3-8.1.102mdk.x86_64.rpm
 d6d790e26c405512a1ab7000cbb8ea02  x86_64/10.2/RPMS/perl-Image-Magick-6.2.0.3-8.1.102mdk.x86_64.rpm
 a0107084465ecdd25a967bc865282c8e  x86_64/10.2/SRPMS/ImageMagick-6.2.0.3-8.1.102mdk.src.rpm

 Corporate Server 2.1:
 404ebb17078c3f09a86217afdb958407  corporate/2.1/RPMS/ImageMagick-5.4.8.3-2.4.C21mdk.i586.rpm
 7aec358404c3c43708bd171f93abda6a  corporate/2.1/RPMS/libMagick5-5.4.8.3-2.4.C21mdk.i586.rpm
 d89eef776bb0709fb7834aa2caa9df83  corporate/2.1/RPMS/libMagick5-devel-5.4.8.3-2.4.C21mdk.i586.rpm
 b2d796af8410f867f3f02f16b977e646  corporate/2.1/RPMS/perl-Magick-5.4.8.3-2.4.C21mdk.i586.rpm
 fc428f61f00a13dab91a583bf7c037b1  corporate/2.1/SRPMS/ImageMagick-5.4.8.3-2.4.C21mdk.src.rpm

 Corporate Server 2.1/X86_64:
 24db2c7377eeecfcb6bff42835a5408e  x86_64/corporate/2.1/RPMS/ImageMagick-5.4.8.3-2.4.C21mdk.x86_64.rpm
 aa24822cb61e3013cc231e9b32b7c239  x86_64/corporate/2.1/RPMS/libMagick5-5.4.8.3-2.4.C21mdk.x86_64.rpm
 7b7086a467ee0b3ef2db9158b37026c8  x86_64/corporate/2.1/RPMS/libMagick5-devel-5.4.8.3-2.4.C21mdk.x86_64.rpm
 ebfffce996bf42b1def96109449da752  x86_64/corporate/2.1/RPMS/perl-Magick-5.4.8.3-2.4.C21mdk.x86_64.rpm
 fc428f61f00a13dab91a583bf7c037b1  x86_64/corporate/2.1/SRPMS/ImageMagick-5.4.8.3-2.4.C21mdk.src.rpm

 Corporate 3.0:
 7c8ac61f65fb056784da754055f29e98  corporate/3.0/RPMS/ImageMagick-5.5.7.15-6.4.C30mdk.i586.rpm
 4c353e45b5b324533149042836076e0a  corporate/3.0/RPMS/ImageMagick-doc-5.5.7.15-6.4.C30mdk.i586.rpm
 1f4a50bf076d4eb0c09130f5e1fb663b  corporate/3.0/RPMS/libMagick5.5.7-5.5.7.15-6.4.C30mdk.i586.rpm
 56c938c54a8e032a72f38bbdbfce0c6b  corporate/3.0/RPMS/libMagick5.5.7-devel-5.5.7.15-6.4.C30mdk.i586.rpm
 1a7ef96b56e35e9afbe2b33a02e2eeba  corporate/3.0/RPMS/perl-Magick-5.5.7.15-6.4.C30mdk.i586.rpm
 478a29a256c3418fe826746f761f9dd0  corporate/3.0/SRPMS/ImageMagick-5.5.7.15-6.4.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 cb784d42be12ece05ad872a45da61e3d  x86_64/corporate/3.0/RPMS/ImageMagick-5.5.7.15-6.4.C30mdk.x86_64.rpm
 076932dfe4a0975c14f7f6027ed650dd  x86_64/corporate/3.0/RPMS/ImageMagick-doc-5.5.7.15-6.4.C30mdk.x86_64.rpm
 4ee3b5ffb7aa2496e1ad6448d23e48db  x86_64/corporate/3.0/RPMS/lib64Magick5.5.7-5.5.7.15-6.4.C30mdk.x86_64.rpm
 eb7d4c0aa93e759890c906fe3a89f43c  x86_64/corporate/3.0/RPMS/lib64Magick5.5.7-devel-5.5.7.15-6.4.C30mdk.x86_64.rpm
 a20da02a6fd0d101ff7166c836f5da91  x86_64/corporate/3.0/RPMS/perl-Magick-5.5.7.15-6.4.C30mdk.x86_64.rpm
 478a29a256c3418fe826746f761f9dd0  x86_64/corporate/3.0/SRPMS/ImageMagick-5.5.7.15-6.4.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFCwbOcmqjQ0CJFipgRAo3AAJ4vO8Oy8yjSNJa4XlQTkC3V53TBRACeNzqg
lEQSLcV9DD+pkBjjbWHBLpQ=
=ZDkd
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ