Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in graphicsmagick
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in graphicsmagick
ID: DSA-4321-1
Distribution: Debian
Plattformen: Debian stretch
Datum: Mi, 17. Oktober 2018, 07:39
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10794
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17912
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12936
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17913
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14997
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9018
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17915
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12937
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14504
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065
Applikationen: GraphicsMagick

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4321-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 16, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : graphicsmagick
CVE ID : CVE-2017-10794 CVE-2017-10799 CVE-2017-10800 CVE-2017-11102
CVE-2017-11139 CVE-2017-11140 CVE-2017-11403 CVE-2017-11636
CVE-2017-11637 CVE-2017-11638 CVE-2017-11641 CVE-2017-11642
CVE-2017-11643 CVE-2017-11722 CVE-2017-12935 CVE-2017-12936
CVE-2017-12937 CVE-2017-13063 CVE-2017-13064 CVE-2017-13065
CVE-2017-13134 CVE-2017-13737 CVE-2017-13775 CVE-2017-13776
CVE-2017-13777 CVE-2017-14314 CVE-2017-14504 CVE-2017-14733
CVE-2017-14994 CVE-2017-14997 CVE-2017-15238 CVE-2017-15277
CVE-2017-15930 CVE-2017-16352 CVE-2017-16353 CVE-2017-16545
CVE-2017-16547 CVE-2017-16669 CVE-2017-17498 CVE-2017-17500
CVE-2017-17501 CVE-2017-17502 CVE-2017-17503 CVE-2017-17782
CVE-2017-17783 CVE-2017-17912 CVE-2017-17913 CVE-2017-17915
CVE-2017-18219 CVE-2017-18220 CVE-2017-18229 CVE-2017-18230
CVE-2017-18231 CVE-2018-5685 CVE-2018-6799 CVE-2018-9018

Several vulnerabilities have been discovered in GraphicsMagick, a set of
command-line applications to manipulate image files, which could result
in denial of service or the execution of arbitrary code if malformed
image files are processed.

For the stable distribution (stretch), these problems have been fixed in
version 1.3.30+hg15796-1~deb9u1.

We recommend that you upgrade your graphicsmagick packages.

For the detailed security status of graphicsmagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/graphicsmagick

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=dx0e
-----END PGP SIGNATURE-----
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung