Lucene search

K
debianDebianDEBIAN:DLA-3007-1:07151
HistoryMay 14, 2022 - 1:28 p.m.

[SECURITY] [DLA-3007-1] imagemagick security update

2022-05-1413:28:05
lists.debian.org
42

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.0%


Debian LTS Advisory DLA-3007-1 [email protected]
https://www.debian.org/lts/security/ Andreas Rönnquist
May 14, 2022 https://wiki.debian.org/LTS


Package : imagemagick
Version : 8:6.9.7.4+dfsg-11+deb9u14
CVE ID : CVE-2021-3596 CVE-2022-28463

CVE-2021-3596

A NULL pointer dereference flaw was found in
ImageMagick in versions prior to 7.0.10-31 in ReadSVGImage() in
coders/svg.c. This issue is due to not checking the return value from
libxml2's xmlCreatePushParserCtxt() and uses the value directly, which
leads to a crash and segmentation fault.

CVE-2022-28463

ImageMagick is vulnerable to Buffer Overflow.

For Debian 9 stretch, these problems have been fixed in version
8:6.9.7.4+dfsg-11+deb9u14.

We recommend that you upgrade your imagemagick packages.

For the detailed security status of imagemagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/imagemagick

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.0%