[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ MDVSA-2012:160 ] imagemagick
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: [ MDVSA-2012:160 ] imagemagick
- From: security@xxxxxxxxxxxx
- Date: Fri, 05 Oct 2012 18:12:00 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2012:160
http://www.mandriva.com/security/
_______________________________________________________________________
Package : imagemagick
Date : October 5, 2012
Affected: 2011., Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A vulnerability has been found and corrected in imagemagick:
The Magick_png_malloc function in coders/png.c in ImageMagick 6.7.8-6
does not use the proper variable type for the allocation size, which
might allow remote attackers to cause a denial of service (crash)
via a crafted PNG file that triggers incorrect memory allocation
(CVE-2012-3437).
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3437
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2011:
e3c76bded9a774eea31a8e6fe670f9b6
2011/i586/imagemagick-6.7.0.9-1.2-mdv2011.0.i586.rpm
e0850b9c33271801e880cc8f34aba0d6
2011/i586/imagemagick-desktop-6.7.0.9-1.2-mdv2011.0.i586.rpm
9d763cf168f088cd295b8dfec0e6c850
2011/i586/imagemagick-doc-6.7.0.9-1.2-mdv2011.0.i586.rpm
89354e093083f69a2ece10439eb9a89c
2011/i586/libmagick4-6.7.0.9-1.2-mdv2011.0.i586.rpm
026e039ee1b2428e3987744d8c0fe132
2011/i586/libmagick-devel-6.7.0.9-1.2-mdv2011.0.i586.rpm
ba14a74f5902c7369280ff15d005c42d
2011/i586/perl-Image-Magick-6.7.0.9-1.2-mdv2011.0.i586.rpm
5456e1d122ec21656f07053d35aaee97 2011/SRPMS/imagemagick-6.7.0.9-1.2.src.rpm
Mandriva Linux 2011/X86_64:
f926991c5980ac2c39ebe4527868c1af
2011/x86_64/imagemagick-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
1e0deadb027234db5e6a1471771daa2e
2011/x86_64/imagemagick-desktop-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
ee861a0cf7dba66e042d9b8f0fd70eda
2011/x86_64/imagemagick-doc-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
b2a886844058051f141fe15a6e53ff16
2011/x86_64/lib64magick4-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
1f8e6c539b1877742f8e64bfdcecbc4d
2011/x86_64/lib64magick-devel-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
2656e1a7b20dd77dd1deea52863e60f0
2011/x86_64/perl-Image-Magick-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
5456e1d122ec21656f07053d35aaee97 2011/SRPMS/imagemagick-6.7.0.9-1.2.src.rpm
Mandriva Enterprise Server 5:
f3aba495ee3a944e4e9ccafdfffac131
mes5/i586/imagemagick-6.4.2.10-5.4mdvmes5.2.i586.rpm
ba1858f1faf3c7e159ec8eebf558411a
mes5/i586/imagemagick-desktop-6.4.2.10-5.4mdvmes5.2.i586.rpm
74a73593b07d82332f9ed7a77a3317f7
mes5/i586/imagemagick-doc-6.4.2.10-5.4mdvmes5.2.i586.rpm
4d5d5b4b7de7dcb477e317ee9604c0c1
mes5/i586/libmagick1-6.4.2.10-5.4mdvmes5.2.i586.rpm
cae27a3fa3c1abfcac6495152622149d
mes5/i586/libmagick-devel-6.4.2.10-5.4mdvmes5.2.i586.rpm
9d892e3973d374a879ad033ac5a2fada
mes5/i586/perl-Image-Magick-6.4.2.10-5.4mdvmes5.2.i586.rpm
98692ccd382085f7419e70475051173b
mes5/SRPMS/imagemagick-6.4.2.10-5.4mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
cd0ff0a94a6e5aae6e205f7a28c68da3
mes5/x86_64/imagemagick-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
39046fb7ab97f63c6df0973a40fae4ce
mes5/x86_64/imagemagick-desktop-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
c63eca56b0a188f49f0584899e512049
mes5/x86_64/imagemagick-doc-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
03608e7eb8ba79563d091178b5de3b60
mes5/x86_64/lib64magick1-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
363f3f3375150377ada47a9f6be761b4
mes5/x86_64/lib64magick-devel-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
17bd98545b888e9d0a1c8e31058fea34
mes5/x86_64/perl-Image-Magick-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
98692ccd382085f7419e70475051173b
mes5/SRPMS/imagemagick-6.4.2.10-5.4mdvmes5.2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFQbtqVmqjQ0CJFipgRAhYQAKDpLs02NTNkWBB63fg5bvubjTD4ygCeN3Bw
IQrU5w9Z06DMH2yFX4mPmdY=
=/48G
-----END PGP SIGNATURE-----