Accepted imagemagick 8:6.9.10.23+dfsg-2.1+deb10u2 (source) into oldstable
- To: debian-lts-changes@lists.debian.org, dispatch@tracker.debian.org
- Subject: Accepted imagemagick 8:6.9.10.23+dfsg-2.1+deb10u2 (source) into oldstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sat, 11 Mar 2023 16:10:18 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: imagemagick_6.9.10.23+dfsg-2.1+deb10u2_source.changes
- Debian-source: imagemagick
- Debian-suite: oldstable
- Debian-version: 8:6.9.10.23+dfsg-2.1+deb10u2
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.seger; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=hrC29eWUKgKCpNoVKDuNwXut7R2zvqHWy85QwCYYQT8=; b=bKWTKpFDz9b/9ZAZMtAK+5Rgcs mC6C8iczUjMDmLOOwUzFdlx1jR5cD1PlEi0LzeckXroevFaP8/+10yL7P5i1cP1ko/F9Pi7tm1UqP WUHWNOhw5JzVK+xPm2nZOdZiEchh34Wv7OtFQCh/clr2X8ztL1esMti+QvTQoFbccLSBCJhW3o4S/ bfbPrJ5PjeK/cRHNRFbDugOzgF2mKRX7LuMYZKQu0vUWII9t8jB/jv/MWG0WK/Y1Fg2Dgl4XoFt7K bGOEfXl3hKTsSZk+Yxf3UL7T6rqMan/scQmYWx+9xKcD1+bcDbM6LKkxRIWNnxsBxaIMe2ojxypCf bT9+dLeA==;
- Mail-followup-to: debian-lts@lists.debian.org
- Message-id: <E1pb1nW-00AttA-Qc@seger.debian.org>
- Reply-to: debian-lts@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 11 Mar 2023 15:05:45 +0000
Source: imagemagick
Architecture: source
Version: 8:6.9.10.23+dfsg-2.1+deb10u2
Distribution: buster-security
Urgency: high
Maintainer: ImageMagick Packaging Team <pkg-gmagick-im-team@lists.alioth.debian.org>
Changed-By: Bastien Roucariès <rouca@debian.org>
Closes: 1027164 1030767
Changes:
imagemagick (8:6.9.10.23+dfsg-2.1+deb10u2) buster-security; urgency=high
.
[ Roberto C. Sánchez ]
* Non-maintainer upload by the LTS Team.
* Fix CVE-2020-19667: Stack-based buffer overflow and unconditional jump in
ReadXPMImage in coders/xpm.c
* Fix CVE-2020-25665: An out-of-bounds read in the PALM image coder in
WritePALMImage in coders/palm.c
* Fix CVE-2020-25666: Integer overflow is possible during simple math
calculations in HistogramCompare() in MagickCore/histogram.c
* Fix CVE-2020-25674: A for loop with an improper exit condition that can
allow an out-of-bounds READ via heap-buffer-overflow in WriteOnePNGImage
from coders/png.c
* Fix CVE-2020-25675: Undefined behavior in the form of integer overflow and
out-of-range values as a result of rounding calculations performed on
unconstrained pixel offsets in the CropImage() and CropImageToTiles()
routines of MagickCore/transform.c
* Fix CVE-2020-25676: Undefined behavior in the form of integer overflow and
out-of-range values as a result of rounding calculations performed on
unconstrained pixel offsets in CatromWeights(), MeshInterpolate(),
InterpolatePixelChannel(), InterpolatePixelChannels(), and
InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c
* Fix CVE-2020-27560: Division by Zero in OptimizeLayerFrames in
MagickCore/layer.c, which may cause a denial of service
* Fix CVE-2020-27750: Division by Zero in MagickCore/colorspace-private.h
and MagickCore/quantum.h, which may cause a denial of service
* Fix CVE-2020-27751: Undefined behavior in the form of values outside the
range of type `unsigned long long` as well as a shift exponent that is too
large for 64-bit type in MagickCore/quantum-export.c
* Fix CVE-2020-27754: In IntensityCompare() of /magick/quantize.c, there are
calls to PixelPacketIntensity() which could return overflowed values
* Fix CVE-2020-27756: In ParseMetaGeometry() of MagickCore/geometry.c, image
height and width calculations can lead to divide-by-zero conditions which
also lead to undefined behavior
* Fix CVE-2020-27757: A floating point math calculation in
ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to
undefined behavior in the form of a value outside the range of type
unsigned long long
* Fix CVE-2020-27758: Undefined behavior in the form of values outside the
range of type `unsigned long long` in coders/txt.c
* Fix CVE-2020-27759: In IntensityCompare() of /MagickCore/quantize.c, a
double value was being casted to int and returned, which in some cases
caused a value outside the range of type `int` to be returned
* Fix CVE-2020-27760: In `GammaImage()` of /MagickCore/enhance.c, depending
on the `gamma` value, it's possible to trigger a divide-by-zero condition
when a crafted input file is processed
* Fix CVE-2020-27761: WritePALMImage() in /coders/palm.c used size_t casts
in several areas of a calculation which could lead to values outside the
range of representable type `unsigned long` undefined behavior when a
crafted input file was processed
* Fix CVE-2020-27762: Undefined behavior in the form of values outside the
range of type `unsigned char` in coders/hdr.c
* Fix CVE-2020-27763: Undefined behavior in the form of math division by
zero in MagickCore/resize.c
* Fix CVE-2020-27764, CVE-2020-27776: Out-of-range values under some
circumstances when a crafted input file is processed in
/MagickCore/statistic.c
* Fix CVE-2020-27765: Undefined behavior in the form of math division by
zero in MagickCore/segment.c when a crafted file is processed
* Fix CVE-2020-27774, CVE-2020-27766: Undefined behavior in the form of
values outside the range of type `unsigned long` and a too large shift for
64-bit type `ssize_t` in MagickCore/statistic.c
* Fix CVE-2020-27767: Undefined behavior in the form of values outside the
range of types `float` and `unsigned char` in MagickCore/quantum.h
* Fix CVE-2020-27768: An outside the range of representable values of type
`unsigned int` in MagickCore/quantum-private.h
* Fix CVE-2020-27769: An outside the range of representable values of type
`float` in MagickCore/quantize.c
* Fix CVE-2020-27770: Due to a missing check for 0 value of
`replace_extent`, it is possible for offset `p` to overflow in
SubstituteString()
* Fix CVE-2020-27771: In RestoreMSCWarning() of /coders/pdf.c there are
several areas where calls to GetPixelIndex() could result in values
outside the range of representable for the `unsigned char` type
* Fix CVE-2020-27772: Undefined behavior in the form of values outside the
range of type `unsigned int` in coders/bmp.c
* Fix CVE-2020-27773: Undefined behavior in the form of values outside the
range of type `unsigned char` or division by zero
* Fix CVE-2020-27775: Undefined behavior in the form of values outside the
range of type `unsigned char` in MagickCore/quantum.h
* Fix CVE-2020-29599: ImageMagick mishandles the -authenticate option, which
allows setting a password for password-protected PDF files. The
user-controlled password was not properly escaped/sanitized and it was
therefore possible to inject additional shell commands via
coders/pdf.c.
* Fix CVE-2021-3596: A NULL pointer dereference flaw in ReadSVGImage() in
coders/svg.c
.
[ Bastien Roucariès ]
* Fix CVE-2021-3574: executing a crafted TIFF file with the convert command,
ASAN detects memory leaks. (Closes: #1027164)
* Fix CVE-2021-20224: An integer overflow issue was discovered in ImageMagick's
ExportIndexQuantum() function in MagickCore/quantum-export.c.
Function calls could result in values outside the range of
representable for the 'unsigned char'.
When ImageMagick processes a crafted pdf file, this could
lead to an undefined behaviour or a crash.
* Mitigate CVE-2022-44267, CVE-2022-44268 by hardening policy.xml.
Forbid reading /etc directory.
* CVE-2022-44268, CVE-2022-44267: do not leak profiles.
(Closes: #1030767)
Checksums-Sha1:
9880bf3cb726ffd14527fd4861e5b4e17161cba9 5187 imagemagick_6.9.10.23+dfsg-2.1+deb10u2.dsc
c0f3b6edd4930d8d0d19c74a7a8f57020dd498c7 249248 imagemagick_6.9.10.23+dfsg-2.1+deb10u2.debian.tar.xz
4a15f31624e6be93dbd31f54ce8630aee0ea4c26 11436 imagemagick_6.9.10.23+dfsg-2.1+deb10u2_source.buildinfo
Checksums-Sha256:
8344a42815133862ce39e9959225d4dcbb0ced96c3016e4ddf53ae436607f269 5187 imagemagick_6.9.10.23+dfsg-2.1+deb10u2.dsc
2fe292cd08ba1a342dea8a9a1f1fc5a4493c97c025484238a805bb1790051758 249248 imagemagick_6.9.10.23+dfsg-2.1+deb10u2.debian.tar.xz
d193480556784b4b718254936177e68711e9cbabd1da46056d8095eed464630b 11436 imagemagick_6.9.10.23+dfsg-2.1+deb10u2_source.buildinfo
Files:
806a745ce1695e213f84d4ee4198ac09 5187 graphics optional imagemagick_6.9.10.23+dfsg-2.1+deb10u2.dsc
154d74af92f11b38899182dab22bf8d6 249248 graphics optional imagemagick_6.9.10.23+dfsg-2.1+deb10u2.debian.tar.xz
7bae00e60f28fcdf22991076b8df24a7 11436 graphics optional imagemagick_6.9.10.23+dfsg-2.1+deb10u2_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQJFBAEBCgAvFiEEXQGHuUCiRbrXsPVqADoaLapBCF8FAmQMpOsRHHJvdWNhQGRl
Ymlhbi5vcmcACgkQADoaLapBCF9GxQ/+N5858tXKM5QOAO5h/2Vs7icfhQzbEDBR
KfjSPRTVY+Oa7QQy8WUBX1xZnMarITl1o5D99vtGg2Wg1z0DY9lm+U9dpKK2R4+a
RBxN2xZXvTLk6ZLmpkBWuBa5KgGdO4b/G8YseARWHV1SFQUHv7I2zl5+82Hlb3nZ
RzZ8sHSdQCMPMVoufORonzGd7YNrJEuNCvDzkoROJK0zV9N4+9C/O3T0oA1A1W0E
9PxBaMBvkVVx+jF6IcUgD9QPCHOdu457DQiQtUM97XkuqhK34pOQoaNfriH1E4kw
AxPIn2VdPQaP63BlvBswMTz8AX6nSyO8p0UvXy2ta8o3XHinBGtoftvdOpdWoUkF
vUFxVZ8SUJBmnJrErwlxMrdlXvPa5f0lBCe6BhSBmtN50fV/rmsj4NV+JFjXuVVn
aEmef9u1kMWpxYuuaiUM2eUO0gedRL1QV1jACJ+YDcog9d5tcP7EgCgO2OKkrlj2
adAvE84ZHd5acuWOpM5s8sGofl2hxwiM5iYC4KI1S0ikWZ0t+9IU7MZ+wffQzAD6
q3TcZe+yhxWjfLWSr5sTsOwbiU3zJC6XSb1K1woKdyu3A5fjo+UlBheCYZ7r6b/g
VIt+VGKzyXG0hISFc4ZZ6okmyz3UhyipDsNmG98GcLLDjhDHUFo2uxHzGuVL8AEP
z/6x6AA89NM=
=IvHY
-----END PGP SIGNATURE-----