{"id":246,"date":"2018-10-17T06:31:16","date_gmt":"2018-10-17T06:31:16","guid":{"rendered":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/10\/17\/debian-dsa-4321-1-graphicsmagick-security-update\/"},"modified":"2018-10-17T06:31:16","modified_gmt":"2018-10-17T06:31:16","slug":"debian-dsa-4321-1-graphicsmagick-security-update","status":"publish","type":"post","link":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/10\/17\/debian-dsa-4321-1-graphicsmagick-security-update\/","title":{"rendered":"Debian: DSA-4321-1: graphicsmagick security update"},"content":{"rendered":"<tr>\n<td>\n<p> <b> Posted by<\/b> Anthony Pell <\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n <a href=\"\/content\/blogcategory\/87\/100\/\"><img decoding=\"async\" alt=\"Debian\" src=\"http:\/\/www.linuxsecurity.com\/images\/stories\/icons\/debian-icon.gif\" \/><\/a><br \/>\n Several vulnerabilities have been discovered in GraphicsMagick, a set of command-line applications to manipulate image files, which could result in denial of service or the execution of arbitrary code if malformed image files are processed. &#xD;&#xD;&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211;<br \/>\nHash: SHA512<\/p>\n<p>&#8211; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>\nDebian Security Advisory DSA-4321-1 security@debian.org<br \/>\nhttps:\/\/www.debian.org\/security\/ Moritz Muehlenhoff<br \/>\nOctober 16, 2018 https:\/\/www.debian.org\/security\/faq<br \/>\n&#8211; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>Package : graphicsmagick<br \/>\nCVE ID : CVE-2017-10794 CVE-2017-10799 CVE-2017-10800 CVE-2017-11102<br \/>\n CVE-2017-11139 CVE-2017-11140 CVE-2017-11403 CVE-2017-11636<br \/>\n CVE-2017-11637 CVE-2017-11638 CVE-2017-11641 CVE-2017-11642<br \/>\n CVE-2017-11643 CVE-2017-11722 CVE-2017-12935 CVE-2017-12936<br \/>\n CVE-2017-12937 CVE-2017-13063 CVE-2017-13064 CVE-2017-13065<br \/>\n CVE-2017-13134 CVE-2017-13737 CVE-2017-13775 CVE-2017-13776<br \/>\n CVE-2017-13777 CVE-2017-14314 CVE-2017-14504 CVE-2017-14733<br \/>\n CVE-2017-14994 CVE-2017-14997 CVE-2017-15238 CVE-2017-15277<br \/>\n CVE-2017-15930 CVE-2017-16352 CVE-2017-16353 CVE-2017-16545<br \/>\n CVE-2017-16547 CVE-2017-16669 CVE-2017-17498 CVE-2017-17500<br \/>\n CVE-2017-17501 CVE-2017-17502 CVE-2017-17503 CVE-2017-17782<br \/>\n CVE-2017-17783 CVE-2017-17912 CVE-2017-17913 CVE-2017-17915<br \/>\n CVE-2017-18219 CVE-2017-18220 CVE-2017-18229 CVE-2017-18230<br \/>\n CVE-2017-18231 CVE-2018-5685 CVE-2018-6799 CVE-2018-9018<\/p>\n<p>Several vulnerabilities have been discovered in GraphicsMagick, a set of<br \/>\ncommand-line applications to manipulate image files, which could result<br \/>\nin denial of service or the execution of arbitrary code if malformed<br \/>\nimage files are processed.<\/p>\n<p>For the stable distribution (stretch), these problems have been fixed in<br \/>\nversion 1.3.30+hg15796-1~deb9u1.<\/p>\n<p>We recommend that you upgrade your graphicsmagick packages.<\/p>\n<p>For the detailed security status of graphicsmagick please refer to<br \/>\nits security tracker page at:<br \/>\nhttps:\/\/security-tracker.debian.org\/tracker\/graphicsmagick<\/p>\n<p>Further information about Debian Security Advisories, how to apply<br \/>\nthese updates to your system and frequently asked questions can be<br \/>\nfound at: https:\/\/www.debian.org\/security\/<\/p>\n<p>Mailing list: debian-security-announce@lists.debian.org<\/p>\n<\/td>\n<\/tr>\n<p> <a href=\"http:\/\/www.linuxsecurity.com\/content\/view\/214423?rdf\" target=\"_blank\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Posted by Anthony Pell Several vulnerabilities have been discovered in GraphicsMagick, a set of command-line applications to manipulate image files, which could result in denial of service or the execution of arbitrary code if malformed image files are processed. &#xD;&#xD;&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211; Hash: SHA512 &#8211; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;- Debian Security Advisory DSA-4321-1 security@debian.org https:\/\/www.debian.org\/security\/ Moritz Muehlenhoff &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/10\/17\/debian-dsa-4321-1-graphicsmagick-security-update\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Debian: DSA-4321-1: graphicsmagick security update&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-246","post","type-post","status-publish","format-standard","hentry","category-linux"],"_links":{"self":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/comments?post=246"}],"version-history":[{"count":0,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/246\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/media?parent=246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/categories?post=246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/tags?post=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}