Deutsch   English   Français   Italiano  
<FvM5z-6hkH-1@gated-at.bofh.it>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder8.news.weretis.net!news.mixmin.net!aioe.org!bofh.it!news.nic.it!robomod
From: Moritz Muehlenhoff <jmm@debian.org>
Newsgroups: linux.debian.announce.security
Subject: [SECURITY] [DSA 5288-1] graphicsmagick security update
Date: Fri, 25 Nov 2022 20:00:01 +0100
Message-ID: <FvM5z-6hkH-1@gated-at.bofh.it>
X-Original-To: debian-security-announce@lists.debian.org
X-Mailbox-Line: From debian-security-announce-request@lists.debian.org  Fri Nov 25 18:58:18 2022
Old-Return-Path: <jmm@seger.debian.org>
X-Amavis-Spam-Status: No, score=-113.905 tagged_above=-10000 required=5.3
	tests=[BAYES_00=-2, DIGITS_LETTERS=1, DKIMWL_WL_HIGH=-0.515,
	DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1,
	DKIM_VALID_EF=-0.1, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02,
	LDO_WHITELIST=-5, PGPSIGNATURE=-5, RCVD_IN_DNSWL_MED=-2.3,
	USER_IN_DKIM_WELCOMELIST=-0.01, USER_IN_DKIM_WHITELIST=-100]
	autolearn=ham autolearn_force=no
Old-Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org;
	s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date
	:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description:
	In-Reply-To:References; bh=i7c6/8QKMnnorqPaDrJc6+KBmuxteyhRVh6bjvqqvM0=; b=XY
	kMV8OnL4ZzBAqFlSGA2wYWk1pKydP1+MuX7BnUBOHvpaxLZcsw0jUNzR8Q4yvSQR7fwCZvTVP9yhy
	jwiZOm5e3/ke0md2lIOae//tA1ZnIl3sI/uI/DXbKTd6ZohJRYs8Ub7jLhMFBkwLCE/mdLjr4j/ro
	KCVAxw9v87DYkxvd0cfJAe0WOMBCWvp/r4Zi0sM6yb4baP6LuZg7zvK2ogjSEJX0kzhdnOgIsQEXd
	nRNZBLWpr5jxUb/mB/wZ1c5CYXRQUyewhh6vyQ1jiIxbpYFEYMxpISk2e/bbHyvNxSwxvITj8kDzI
	P8489x7vhnXz/TDyvy/rB6+p+g1jjJRg==;
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Debian: PGP check passed for security officers
Priority: urgent
Reply-To: debian-security-announce-request@lists.debian.org
X-Mailing-List: <debian-security-announce@lists.debian.org> archive/latest/4188
List-ID: <debian-security-announce.lists.debian.org>
List-URL: <http://lists.debian.org/debian-security-announce/>
List-Archive: https://lists.debian.org/msgid-search/Y4EQLYtVCuOA5QgG@seger.debian.org
Approved: robomod@news.nic.it
Lines: 46
Organization: linux.* mail to news gateway
Sender: robomod@news.nic.it
X-Original-Date: Fri, 25 Nov 2022 18:57:49 +0000
X-Original-Message-ID: <Y4EQLYtVCuOA5QgG@seger.debian.org>
Bytes: 4531

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5288-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 25, 2022                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : graphicsmagick
CVE ID         : CVE-2022-1270

It was discovered that a buffer overflow in GraphicsMagick, a collection
of image processing tools, could potentially result in the execution of
arbitrary code when processing a malformed MIFF image.

For the stable distribution (bullseye), this problem has been fixed in
version 1.4+really1.3.36+hg16481-2+deb11u1.

We recommend that you upgrade your graphicsmagick packages.

For the detailed security status of graphicsmagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/graphicsmagick

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmOBDeAACgkQEMKTtsN8
Tjb2nhAApFL4aW7qgs/eQVA2Y9dK8xx70soxNNTuMXWzm6nFEcyetZzk7CfI3ROF
i1NquOXCR5/XddrR3uAZduSsNINA7Zk3ZYc/o62+v+DjjNSLbAbBer9gSnAQkCD3
QuFfiAmXKH5oOEgjLBz4JKG4g4LMQdM9T5rHasNkywcytRNgnVzo6w6TmqMG1eX+
7q0A4w8pJYeMm1AA2OriIqmaF10V++EjzojHFhgmYWW6oMRild8PekCXffH0d7Zm
f+AzBQrjz9AcihGPjTzTOHCGrpUQuF/zjOSw2/zwz/1ZdEY+GGmljPRoagoUQxcW
cRhVuN3RykY3BbP2/IFFfl2mhoXsKiPO7iZVChejNiGGn2UZ1qxuDYvrdu3ihlDU
6KjZOMznJ7H8OwD7fe8icrkY0L5P6DMu4GHveLx/3alGdHEQcTQggYsCPVSL4kcZ
TiAMrkp8W4gU+wZqmA0R4WksDS3a1cVJtEK4IdfS1YR/lJWgWkMRyr2U2Ig41rp+
4GweURRmFt/jCkizSx+eD/FuspFS7VjYQO2ks3JFveYa4386jzBPMXZY+su2sCaa
EU6eNIWD/2K0fh2G/XEiO9/PAoU8JLP9sDdy/lCurtovMi7XgI5EXCcCxHiadVjR
0uyRjF8hKrsI/Lsm+Js3NcoocRe4RJp4MBi1T2ThMo47YvJRY8g=
=ZQpC
-----END PGP SIGNATURE-----