Debian alert DLA-2421-1 (cimg)
From: | Thorsten Alteholz <debian@alteholz.de> | |
To: | debian-lts-announce@lists.debian.org | |
Subject: | [SECURITY] [DLA 2421-1] cimg security update | |
Date: | Fri, 30 Oct 2020 15:57:04 +0000 | |
Message-ID: | <alpine.DEB.2.21.2010301554360.31626@postfach.intern.alteholz.me> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2421-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Thorsten Alteholz October 30, 2020 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : cimg Version : 1.7.9+dfsg-1+deb9u1 CVE ID : CVE-2018-7588 CVE-2018-7589 CVE-2018-7637 CVE-2018-7638 CVE-2018-7639 CVE-2018-7640 CVE-2018-7641 CVE-2019-1010174 Several issues have been found in cimg, a powerful image processing library. CVE-2019-1010174 is related to a missing string sanitization on URLs, which might result in a command injection when loading a special crafted image. The other CVEs are about heap-based buffer over-reads or double frees when loading a crafted image. For Debian 9 stretch, these problems have been fixed in version 1.7.9+dfsg-1+deb9u1. We recommend that you upgrade your cimg packages. For the detailed security status of cimg please refer to its security tracker page at: https://security-tracker.debian.org/tracker/cimg Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAl+cN9FfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7 WEfE4g/9G4KI6L/adQ+WRhof6xhZfZW+rwWQiP5iIwH7lRV3iiaafVLh16PDUCU7 XZXFqCikMFAwZqtWm6cKkF7zh+vDicNTENZQZqQB3r16qtrHwc1/LL6JzF5FVsCs N+47p6N3os/zwXqabwKzVJRzZXtMXvjeu0ze7VgZlqPJXMmzqPUlEHPl2KjpGh+r FY0EnUQN+6JD4cagHu0iFitBIAbSo3n6uTm42+r4GRIN4YaQYsE5r0NGB2X+klvV LEDJ2pWpbOxHuGbCdLv2gveUrRaLDYC5XEWmwnZe10woUJeGmkcSt2SXOt4GZloz FYt/jb+AwXOgZayLOy0B39JYwnFs9NArB4xnc11K273GKZyQ1VZe5YKmYq4XuJI8 GwlHxJCrWD7rFe4/KAei4QR3AJXpC9Yb3s9pQgyiee9tfqgMnuVAztla75K0E2C3 BLPcgC4d3HZxxzMdKGt7/PyAorDndO49lYyTunkAaCXo5blOiCn/ZdqGTv+kfj/L +Zk/y3sMYzI2xzCnx/e2IQTH5XMWvIGoJUgUHjkemVDOgJLb4WXzW5r685jWDMN/ SX6JunRvqGK5AJnDBolTp31fPoDi/7/CJ3qf0CKmM+gYBATiIHaNZ/ZNt0RsRNo1 fX4QxHHtFmH7pjptL8kAeGxb4NMH9YklIHTcr62bnr3VezW2gck= =GQ8X -----END PGP SIGNATURE-----