User: Password:
Subscribe / Log in / New account

Debian alert DSA-1213-1 (imagemagick)

From:  Moritz Muehlenhoff <>
Subject:  [SECURITY] [DSA 1213-1] New imagemagick packages fix several vulnerabilities
Date:  Sun, 19 Nov 2006 13:43:56 +0100

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1213-1 Moritz Muehlenhoff November 19th, 2006 - -------------------------------------------------------------------------- Package : imagemagick Vulnerability : several Problem-Type : local(remote) Debian-specific: no CVE ID : CVE-2006-0082 CVE-2006-4144 CVE-2006-5456 CVE-2006-5868 Debian Bug : 345876 383314 393025 Several remote vulnerabilities have been discovered in Imagemagick, a collection of image manipulation programs, which may lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-0082 Daniel Kobras discovered that Imagemagick is vulnerable to format string attacks in the filename parsing code. CVE-2006-4144 Damian Put discovered that Imagemagick is vulnerable to buffer overflows in the module for SGI images. CVE-2006-5456 M Joonas Pihlaja discovered that Imagemagick is vulnerable to buffer overflows in the module for DCM and PALM images. CVE-2006-5868 Daniel Kobras discovered that Imagemagick is vulnerable to buffer overflows in the module for SGI images. This update also adresses regressions in the XCF codec, which were introduced in the previous security update. For the stable distribution (sarge) these problems have been fixed in version 6: For the upcoming stable distribution (etch) these problems have been fixed in version 7: For the unstable distribution (sid) these problems have been fixed in version 7: We recommend that you upgrade your imagemagick packages. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: Size/MD5 checksum: 881 0f3c7174962dcaf0be7b3027312d3438 Size/MD5 checksum: 142001 c2be91d527c1714ee0ece93b090792c7 Size/MD5 checksum: 6824001 477a361ba0154cc2423726fab4a3f57c Alpha architecture: Size/MD5 checksum: 1469720 b311ede0075f36157e9c9c244a382cb6 Size/MD5 checksum: 173974 34306082902f34914d4d0823f0e153c8 Size/MD5 checksum: 288800 fa2b7d2ad5708e66fbc5c14f830bace0 Size/MD5 checksum: 1285588 cabe582c14962459c8bc8dffc7d3a516 Size/MD5 checksum: 2204442 080e9f6d25c7b1f1df10dd1828f85273 Size/MD5 checksum: 143902 98099204464269c5386244cb1fee775f AMD64 architecture: Size/MD5 checksum: 1466352 d50a197f3c3f0e15f1530d56177a1c72 Size/MD5 checksum: 163602 642d806539f42d3bd3645edb021bae16 Size/MD5 checksum: 228744 9b7c462060e0769f1561da5dcfb32dee Size/MD5 checksum: 1194980 51182a82a05f1f47c435f246a21469ad Size/MD5 checksum: 1550348 43d9d80bd42b3dc6f6d611a997a17c2e Size/MD5 checksum: 231800 6375c61e8edc60fa928665cf45ec011c ARM architecture: Size/MD5 checksum: 1466148 a0c6fcb562afa6d5f8736beda4dade43 Size/MD5 checksum: 149342 9a184c8f6d3d204748ed30a1c57dbd1f Size/MD5 checksum: 234806 0d4865aaf1dd850604ce9b728e65def6 Size/MD5 checksum: 1204646 02fbc1c7b8b98d1977e4861211f1255a Size/MD5 checksum: 1647698 cef197d1c2ce919413ab12bd1b99187a Size/MD5 checksum: 230484 5b5dbe487dc580a5f164cf862552ab4d HP Precision architecture: Size/MD5 checksum: 1468290 329777db0d2b061398268f9fd8d6a7a7 Size/MD5 checksum: 182170 e190aad821d4e96ba2b84fc4d3b49da8 Size/MD5 checksum: 273890 434201d0f53175e739ce45addbe2ce01 Size/MD5 checksum: 1404728 cfe2739dac2b84497a00f92b5c4b36ad Size/MD5 checksum: 1827810 14e7e2febd80f1551cfa9b035ed9222c Size/MD5 checksum: 243804 e4bfc17d51547976f7f4db09f6cc6997 Intel IA-32 architecture: Size/MD5 checksum: 1466106 0ee2e904990dbcbeee0b90c2fa95ac62 Size/MD5 checksum: 164440 708d64c7a92419a98e7d305089b1b0c4 Size/MD5 checksum: 208932 eed51be1f03a91e624194e9dea211ff2 Size/MD5 checksum: 1172262 22f32c18dc71c7b24eff16f1fec1c243 Size/MD5 checksum: 1507516 ea9e1148fa72e6be94462a46d30304b0 Size/MD5 checksum: 233964 e47cbf76b993c0eb44adcf85e125d75c Intel IA-64 architecture: Size/MD5 checksum: 1468472 6b31e556cf944fe2d89ad8d2c09cc43a Size/MD5 checksum: 188272 7bf4012fe64aa60c8aac88b263b620c4 Size/MD5 checksum: 295958 dcf1b145b868414bd2357d21ace70fb2 Size/MD5 checksum: 1605554 7ab0f7944f25bbaca6266e3bce816132 Size/MD5 checksum: 2132552 7324f4a81b5496cc7c9182ae2bb082fb Size/MD5 checksum: 273506 fa943563a08e04b06c0632afe7f4bc92 Motorola 680x0 architecture: Size/MD5 checksum: 1466154 1f5c2b36763032352c2b45144517a5b8 Size/MD5 checksum: 159998 624ebcd80f960f7227095411cbdfb90c Size/MD5 checksum: 210680 91b3bafec7f54823cb2720966fcc4825 Size/MD5 checksum: 1073256 b7f77626db0631d990422a3cae43f517 Size/MD5 checksum: 1288834 fd7af651e4d2d5124b45228d30dc6737 Size/MD5 checksum: 226942 f097f5c845a1159029271cba7112141f Big endian MIPS architecture: Size/MD5 checksum: 1490232 6aff49b4b30fc146abde3fcbefe85d5f Size/MD5 checksum: 155500 416074125be015d5c49a90ac032c5182 Size/MD5 checksum: 254800 b8f762578afa79b0210dec43547917a4 Size/MD5 checksum: 1119320 6c778533f22c4f7e7c1dd268b5b59c3a Size/MD5 checksum: 1704446 6855a0354042ab9b283bc3966f4f665f Size/MD5 checksum: 131304 74185bb1115a3bcd50085df4fac2e50f Little endian MIPS architecture: Size/MD5 checksum: 1490202 bd3a8c344eb9927d656543c20d784f38 Size/MD5 checksum: 151598 d903083280a2428e35516444c93c7d03 Size/MD5 checksum: 250056 7c7c6a65f433eee855e775b2e4eafcf3 Size/MD5 checksum: 1114750 13012fdd898b1aa77267f90b73563e50 Size/MD5 checksum: 1667906 1aeb160d222b005e4103c715d964b0db Size/MD5 checksum: 130912 84b347ac516de3a89060c2e010a63cf0 PowerPC architecture: Size/MD5 checksum: 1471774 5e218bb6d5e36cf50c80ebbf77a56abe Size/MD5 checksum: 156748 4564f4918218c6e6c60fe587fd25d118 Size/MD5 checksum: 227722 5eba56a195be2aca1354fce454293a9f Size/MD5 checksum: 1169510 92e5f7ca8fdf727e3a88a48262219c8e Size/MD5 checksum: 1684852 dc528d0a8080493c028bfca9665dcca3 Size/MD5 checksum: 270502 cc408c569b2ce9d03576b4bd9bcb0cb0 IBM S/390 architecture: Size/MD5 checksum: 1467494 d1a9308491175f690a73f720caa7532b Size/MD5 checksum: 180486 6693ec2651a6f959a7f3f08efbeeea6f Size/MD5 checksum: 230182 93a55b0f22a8339b13e2816a970ca102 Size/MD5 checksum: 1194334 e93c9333e1adc98bb7b99e6d2904d995 Size/MD5 checksum: 1530886 db33e6bb01f6d927c02053f0cdd4bf89 Size/MD5 checksum: 242114 51baccefbc53499f3514911521d76c76 Sun Sparc architecture: Size/MD5 checksum: 1465694 d77c64a8e1c40678070a79011abcb8a5 Size/MD5 checksum: 161036 dadfff14cc51b0fb9561bf6469b61a3e Size/MD5 checksum: 224332 c8ebb9dbff86871dc12e3d5ae275bc12 Size/MD5 checksum: 1249156 461cd22009434968fd4011481ce01044 Size/MD5 checksum: 1684366 00b473e9bf9e417a4f0bcff753ed727b Size/MD5 checksum: 230898 020b71df283f6391f3a15415be45a375 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: Package info: `apt-cache show <pkg>' and<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFYFEwXm3vHE4uyloRArXzAJ0YznPidHhiaFobF4vjb/1lmUUxLwCcDFt9 UuEPCaiPwXcaFELt0v+3GWA= =Gh4l -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to with a subject of "unsubscribe". Trouble? Contact

(Log in to post comments)

Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds