This bug was fixed in the package imagemagick - 8:6.7.7.10-6ubuntu3.13 --------------- imagemagick (8:6.7.7.10-6ubuntu3.13) trusty-security; urgency=medium
[ Steve Beattie ] * SECURITY UPDATE: code execution vulnerabilities in ghostscript as invoked by imagemagick - debian/patches/200-disable-ghostscript-formats.patch: disable ghostscript handled types by default in policy.xml * SECURITY UPDATE: information leak in ReadXBMImage - debian/patches/CVE-2018-16323.patch: don't leave data uninitialized with negative pixels - CVE-2018-16323 * SECURITY UPDATE: memory leak of colormap in WriteMPCImage - debian/patches/CVE-2018-14434.patch: free colormap on bad color depth - CVE-2018-14434 * SECURITY UPDATE: memory leak in DecodeImage - debian/patches/CVE-2018-14435.patch: free memory when given a bad plane - CVE-2018-14435 * SECURITY UPDATE: memory leak in ReadMIFFImage - debian/patches/CVE-2018-14436.patch: free memory when given a bad depth - CVE-2018-14436 * SECURITY UPDATE: memory leak in parse8BIM - debian/patches/CVE-2018-14437-prereq.patch: check for negative values - debian/patches/CVE-2018-14437.patch: free strings in error conditions - CVE-2018-14437 * SECURITY UPDATE: memory leak in ReadOneJNGImage - debian/patches/CVE-2018-16640-prereq-1.patch: define DestroyJNG() - debian/patches/CVE-2018-16640-prereq-2.patch: fix DestroyJNG() - debian/patches/CVE-2018-16640.patch: free memory on error - CVE-2018-16640 * SECURITY UPDATE: denial of service due to out-of-bounds write in InsertRow - debian/patches/CVE-2018-16642.patch: improve checking for errors - CVE-2018-16642 * SECURITY UPDATE: denial of service due to missing fputc checks - debian/patches/CVE-2018-16643.patch: check fputc calls for error - CVE-2018-16643 * SECURITY UPDATE: denial of service in ReadDCMImage and ReadPICTImage - debian/patches/CVE-2018-16644-prereq-1.patch: make ReadRectangle() a boolean returning function and use it. - debian/patches/CVE-2018-16644-prereq-2.patch: check for EOF when reading from file - debian/patches/CVE-2018-16644-prereq-3.patch: define ThrowPICTException() macro and use it - debian/patches/CVE-2018-16644-1.patch, debian/patches/CVE-2018-16644-2.patch: check for invalid length - CVE-2018-16644 * SECURITY UPDATE: excessive memory allocation issue in ReadBMPImage - debian/patches/CVE-2018-16645.patch: ensure number_colors is not too large - CVE-2018-16645 * SECURITY UPDATE: denial of service in ReadOneJNGImage - debian/patches/CVE-2018-16749.patch; check for NULL color_image - CVE-2018-16749 * SECURITY UPDATE: memory leak in formatIPTCfromBuffer - debian/patches/CVE-2018-16750.patch: free memory on error - CVE-2018-16750 [ Marc Deslauriers ] * SECURITY REGRESSION: segfault in png to gif conversion (LP: #1793485) - debian/patches/0297-CVE-2017-13144.patch: removed pending further investigation. - debian/patches/CVE-2017-12430.patch: refreshed. -- Steve Beattie <sbeat...@ubuntu.com> Fri, 28 Sep 2018 11:21:01 -0700 ** Changed in: imagemagick (Ubuntu Trusty) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12430 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14434 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14435 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14436 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14437 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-16323 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-16640 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-16642 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-16643 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-16644 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-16645 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-16749 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-16750 ** Changed in: imagemagick (Ubuntu Xenial) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1793485 Title: segfault in png to gif conversion To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1793485/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs