[SECURITY] [DSA 3591-1] imagemagick security update

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3591-1                   security@xxxxxxxxxx
https://www.debian.org/security/                            Luciano Bello
June 01, 2016                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : imagemagick
CVE ID         : CVE-2016-5118
Debian Bug     : 825799

Bob Friesenhahn from the GraphicsMagick project discovered a command
injection vulnerability in ImageMagick, a program suite for image
manipulation. An attacker with control on input image or the input
filename can execute arbitrary commands with the privileges of the user
running the application. 

This update removes the possibility of using pipe (|) in filenames to
interact with imagemagick.

It is important that you upgrade the libmagickcore-6.q16-2 and not just
the imagemagick package. Applications using libmagickcore-6.q16-2 might
also be affected and need to be restarted after the upgrade.

For the stable distribution (jessie), this problem has been fixed in
version 6.8.9.9-5+deb8u3.

We recommend that you upgrade your imagemagick packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJXTrgYAAoJEG7C3vaP/jd051kQAIvICEXyTZ80DvFl1z6gFK9y
5qaS3wHqH5LI9pr6STRi2T3zjCjLErUzHfmfIQkkfjV2IOLOGYo5Np3MIYAVXwee
R65969LW3K0e7sFGMG56yPspGIJ9xU7bmtxN48ooxLhvpFLwUmZowedQH+iEnVph
/JhxPlA82Tk7lHaqbrtXmvo06THl2NwwD3Fxa6m5gVI6A3oAHPWx7z7uhagfusWO
cPOcPdRIPCF8mNERpiggmtNLTRpnRx9XNokJGLrsofY64J9L9qB4CXHQP5JxBH0z
AnKewYm2Ez9il8m+kfVEkbQ3Q5G53Te3ezN+l01Bw2kfzAf9KunkPn/fmO+TBrk/
flyy2DvGjRx4j5awcMGXfXTilF/ImtO/BBF/w0NfRdKV29/3OLNQsBL9uP2eO1iC
ClkFfLMWmXsy7kN19jimIZyllX6TTC8xjHPw+3Nv/pe8KTHgPiqw+OMDCMS6kk+c
2hDkTwushUl2afNPVRUQn2HdsQUekjPist6ieVl4v1ywl44XwYHjslAuD3oIJKIY
kXwa97OCxCaCxv4SrocSLDKdJWVmZZ7zvgKIzDQQPUUTAqiRZCWY37ll5VCmZr1A
l7l2+KvmiDmyh8ofmmELBcy4ggqCWR2ofTyMLAEB0Qod2Eop6zxQwaxyZfHZ6UUp
vk1xibycgsAc2IFNj8h5
=crNt
-----END PGP SIGNATURE-----




[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux