You are here
Home > Preporuke > Ranjivosti programskog paketa imagemagick

Ranjivosti programskog paketa imagemagick

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ————————————————————————-
Debian Security Advisory DSA-2897-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
April 09, 2014 http://www.debian.org/security/faq
– ————————————————————————-

Package : imagemagick
CVE ID : CVE-2014-1947 CVE-2014-1958 CVE-2014-2030

Several buffer overflows were found in Imagemagick, a suite of image
manipulation programs. Processing malformed PSD files could lead to the
execution of arbitrary code.

For the oldstable distribution (squeeze), these problems have been fixed
in version 8:6.6.0.4-3+squeeze4.

For the stable distribution (wheezy), these problems have been fixed in
version 8:6.7.7.10-5+deb7u3.

For the testing distribution (jessie), these problems have been fixed in
version 8:6.7.7.10+dfsg-1.

For the unstable distribution (sid), these problems have been fixed in
version 8:6.7.7.10+dfsg-1.

We recommend that you upgrade your imagemagick packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=VsLD
—–END PGP SIGNATURE—–


To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20140409171154.GA2622@pisco.westfalen.local

Top
More in Preporuke
Sigurnosni propusti programskog paketa openssh

Otkrivena su dva propusta u programskom paketu openssh na Mandriva Business Server 1.0. Prvi propust očitovao se nepravilnim upravljanjem wildcard...

Close