Path: ...!weretis.net!feeder8.news.weretis.net!news.mixmin.net!aioe.org!bofh.it!news.nic.it!robomod From: Moritz Muehlenhoff Newsgroups: linux.debian.announce.security Subject: [SECURITY] [DSA 5288-1] graphicsmagick security update Date: Fri, 25 Nov 2022 20:00:01 +0100 Message-ID: X-Original-To: debian-security-announce@lists.debian.org X-Mailbox-Line: From debian-security-announce-request@lists.debian.org Fri Nov 25 18:58:18 2022 Old-Return-Path: X-Amavis-Spam-Status: No, score=-113.905 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, DIGITS_LETTERS=1, DKIMWL_WL_HIGH=-0.515, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02, LDO_WHITELIST=-5, PGPSIGNATURE=-5, RCVD_IN_DNSWL_MED=-2.3, USER_IN_DKIM_WELCOMELIST=-0.01, USER_IN_DKIM_WHITELIST=-100] autolearn=ham autolearn_force=no Old-Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=i7c6/8QKMnnorqPaDrJc6+KBmuxteyhRVh6bjvqqvM0=; b=XY kMV8OnL4ZzBAqFlSGA2wYWk1pKydP1+MuX7BnUBOHvpaxLZcsw0jUNzR8Q4yvSQR7fwCZvTVP9yhy jwiZOm5e3/ke0md2lIOae//tA1ZnIl3sI/uI/DXbKTd6ZohJRYs8Ub7jLhMFBkwLCE/mdLjr4j/ro KCVAxw9v87DYkxvd0cfJAe0WOMBCWvp/r4Zi0sM6yb4baP6LuZg7zvK2ogjSEJX0kzhdnOgIsQEXd nRNZBLWpr5jxUb/mB/wZ1c5CYXRQUyewhh6vyQ1jiIxbpYFEYMxpISk2e/bbHyvNxSwxvITj8kDzI P8489x7vhnXz/TDyvy/rB6+p+g1jjJRg==; MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Debian: PGP check passed for security officers Priority: urgent Reply-To: debian-security-announce-request@lists.debian.org X-Mailing-List: archive/latest/4188 List-ID: List-URL: List-Archive: https://lists.debian.org/msgid-search/Y4EQLYtVCuOA5QgG@seger.debian.org Approved: robomod@news.nic.it Lines: 46 Organization: linux.* mail to news gateway Sender: robomod@news.nic.it X-Original-Date: Fri, 25 Nov 2022 18:57:49 +0000 X-Original-Message-ID: Bytes: 4531 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5288-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff November 25, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : graphicsmagick CVE ID : CVE-2022-1270 It was discovered that a buffer overflow in GraphicsMagick, a collection of image processing tools, could potentially result in the execution of arbitrary code when processing a malformed MIFF image. For the stable distribution (bullseye), this problem has been fixed in version 1.4+really1.3.36+hg16481-2+deb11u1. We recommend that you upgrade your graphicsmagick packages. For the detailed security status of graphicsmagick please refer to its security tracker page at: https://security-tracker.debian.org/tracker/graphicsmagick Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmOBDeAACgkQEMKTtsN8 Tjb2nhAApFL4aW7qgs/eQVA2Y9dK8xx70soxNNTuMXWzm6nFEcyetZzk7CfI3ROF i1NquOXCR5/XddrR3uAZduSsNINA7Zk3ZYc/o62+v+DjjNSLbAbBer9gSnAQkCD3 QuFfiAmXKH5oOEgjLBz4JKG4g4LMQdM9T5rHasNkywcytRNgnVzo6w6TmqMG1eX+ 7q0A4w8pJYeMm1AA2OriIqmaF10V++EjzojHFhgmYWW6oMRild8PekCXffH0d7Zm f+AzBQrjz9AcihGPjTzTOHCGrpUQuF/zjOSw2/zwz/1ZdEY+GGmljPRoagoUQxcW cRhVuN3RykY3BbP2/IFFfl2mhoXsKiPO7iZVChejNiGGn2UZ1qxuDYvrdu3ihlDU 6KjZOMznJ7H8OwD7fe8icrkY0L5P6DMu4GHveLx/3alGdHEQcTQggYsCPVSL4kcZ TiAMrkp8W4gU+wZqmA0R4WksDS3a1cVJtEK4IdfS1YR/lJWgWkMRyr2U2Ig41rp+ 4GweURRmFt/jCkizSx+eD/FuspFS7VjYQO2ks3JFveYa4386jzBPMXZY+su2sCaa EU6eNIWD/2K0fh2G/XEiO9/PAoU8JLP9sDdy/lCurtovMi7XgI5EXCcCxHiadVjR 0uyRjF8hKrsI/Lsm+Js3NcoocRe4RJp4MBi1T2ThMo47YvJRY8g= =ZQpC -----END PGP SIGNATURE-----