imagemagick (8:6.7.7.10-6ubuntu3) trusty; urgency=medium * SECURITY UPDATE: denial of service and possible code execution via psd images processing rle decoding buffer overflow - debian/patches/CVE-2014-1958.patch: check lengths in coders/psd.c. - CVE-2014-1958 * SECURITY UPDATE: denial of service via jpeg images with specially- crafted restart markers - debian/patches/CVE-2014-2030.patch: don't overflow layer_name in coders/psd.c. - CVE-2014-2030
Date: Thu, 06 Mar 2014 11:12:57 -0500 Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com> Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com> https://launchpad.net/ubuntu/trusty/+source/imagemagick/8:6.7.7.10-6ubuntu3
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 06 Mar 2014 11:12:57 -0500 Source: imagemagick Binary: imagemagick imagemagick-dbg imagemagick-common imagemagick-doc libmagickcore5 libmagickcore5-extra libmagickcore-dev libmagickwand5 libmagickwand-dev libmagick++5 libmagick++-dev perlmagick Architecture: source Version: 8:6.7.7.10-6ubuntu3 Distribution: trusty Urgency: medium Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com> Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com> Description: imagemagick - image manipulation programs imagemagick-common - image manipulation programs -- infrastructure imagemagick-dbg - debugging symbols for ImageMagick imagemagick-doc - document files of ImageMagick libmagick++-dev - object-oriented C++ interface to ImageMagick - development files libmagick++5 - object-oriented C++ interface to ImageMagick libmagickcore-dev - low-level image manipulation library - development files libmagickcore5 - low-level image manipulation library libmagickcore5-extra - low-level image manipulation library - extra codecs libmagickwand-dev - image manipulation library - development files libmagickwand5 - image manipulation library perlmagick - Perl interface to the ImageMagick graphics routines Changes: imagemagick (8:6.7.7.10-6ubuntu3) trusty; urgency=medium . * SECURITY UPDATE: denial of service and possible code execution via psd images processing rle decoding buffer overflow - debian/patches/CVE-2014-1958.patch: check lengths in coders/psd.c. - CVE-2014-1958 * SECURITY UPDATE: denial of service via jpeg images with specially- crafted restart markers - debian/patches/CVE-2014-2030.patch: don't overflow layer_name in coders/psd.c. - CVE-2014-2030 Checksums-Sha1: 0b2231dabae9bad5cf180810fc41a9a48442ffa6 3231 imagemagick_6.7.7.10-6ubuntu3.dsc f40a5f04e3a68c4241ab73bfbef48035ee8c7773 142805 imagemagick_6.7.7.10-6ubuntu3.debian.tar.bz2 Checksums-Sha256: a6752ae64491acd08330043acfeca1eb169fada55041f360a59596afad832fee 3231 imagemagick_6.7.7.10-6ubuntu3.dsc 11f0ae1522a1f12f24a75add8604617380faec477670bada5535c9b410a3502d 142805 imagemagick_6.7.7.10-6ubuntu3.debian.tar.bz2 Files: 7dbce3c5df78fe0152eb237b27bad937 3231 graphics optional imagemagick_6.7.7.10-6ubuntu3.dsc 7f0a04e9e78e9d7434842b96d4ca6bc7 142805 graphics optional imagemagick_6.7.7.10-6ubuntu3.debian.tar.bz2 Original-Maintainer: ImageMagick Packaging Team <pkg-gmagick-im-t...@lists.alioth.debian.org> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJTGLLWAAoJEGVp2FWnRL6T1AwQAIPzn/vmnhkACB4hFJcZH9mD JZuKJlANUYYfD2ghykfpD2NOkqXmlrdEW38qV7EiEuD+tSsEcZUVDNjAL6h1zANS hdYNgA2H2IL1PXlmxRwe+9oaCCP+kCZDjb6dMrm8NEdukVxB4x4hxeD1X6gMJrhR X39gEq/9SuAbLgiKEgoVimI2zlFMxqxHtifFe3kYvrpLfGefexDvvoInjUF7LjUY gZ8wPyhKoWtH8BKoxq65Ix0wf5KFlyNUPTBI2srlPzU8sDTpK89Pd+8ecDd7trve c6HhiIsaOdJEPqjXuOXsjY1gxuKDrLfkGCrzVTmWoStgMHRyGGRYUep5BQGt9iyP enEgflwvSlZchwv7Zw001Ku0l+vEsUJ4TDDKumk9AXXv1FF1Z7kpXAQdwgFbVEuY JVEg14ZqYoWuVcPzD6fcNhY3+Ir5Oxr02cvTlLuz5UBKXe++fGf0nTEgB50Yl0Bo GqrERztXbxgd1Q3RXqPHWwXsE7MUbNvFTnIOXtLkjM9sqIqeSAR8z720tXf7o4gj 4Suj7GS/uE4U+3GH/sXfBTygV9jxLAR9mAs04ccESdBraQR+ZVvKmBye5r4ltiVC uGPB8fXjbqv3XNMc/CIawFNf1PyQ0CLNBFaBVHKqaHOkCa6/WbhUGu3TRFzZInB7 dHZAXwx+diOS53ylXVYb =Kcyp -----END PGP SIGNATURE-----
-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes