-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:160
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : imagemagick
 Date    : October 5, 2012
 Affected: 2011., Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been found and corrected in imagemagick:
 
 The Magick_png_malloc function in coders/png.c in ImageMagick 6.7.8-6
 does not use the proper variable type for the allocation size, which
 might allow remote attackers to cause a denial of service (crash)
 via a crafted PNG file that triggers incorrect memory allocation
 (CVE-2012-3437).
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3437
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2011:
 e3c76bded9a774eea31a8e6fe670f9b6  
2011/i586/imagemagick-6.7.0.9-1.2-mdv2011.0.i586.rpm
 e0850b9c33271801e880cc8f34aba0d6  
2011/i586/imagemagick-desktop-6.7.0.9-1.2-mdv2011.0.i586.rpm
 9d763cf168f088cd295b8dfec0e6c850  
2011/i586/imagemagick-doc-6.7.0.9-1.2-mdv2011.0.i586.rpm
 89354e093083f69a2ece10439eb9a89c  
2011/i586/libmagick4-6.7.0.9-1.2-mdv2011.0.i586.rpm
 026e039ee1b2428e3987744d8c0fe132  
2011/i586/libmagick-devel-6.7.0.9-1.2-mdv2011.0.i586.rpm
 ba14a74f5902c7369280ff15d005c42d  
2011/i586/perl-Image-Magick-6.7.0.9-1.2-mdv2011.0.i586.rpm 
 5456e1d122ec21656f07053d35aaee97  2011/SRPMS/imagemagick-6.7.0.9-1.2.src.rpm

 Mandriva Linux 2011/X86_64:
 f926991c5980ac2c39ebe4527868c1af  
2011/x86_64/imagemagick-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
 1e0deadb027234db5e6a1471771daa2e  
2011/x86_64/imagemagick-desktop-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
 ee861a0cf7dba66e042d9b8f0fd70eda  
2011/x86_64/imagemagick-doc-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
 b2a886844058051f141fe15a6e53ff16  
2011/x86_64/lib64magick4-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
 1f8e6c539b1877742f8e64bfdcecbc4d  
2011/x86_64/lib64magick-devel-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
 2656e1a7b20dd77dd1deea52863e60f0  
2011/x86_64/perl-Image-Magick-6.7.0.9-1.2-mdv2011.0.x86_64.rpm 
 5456e1d122ec21656f07053d35aaee97  2011/SRPMS/imagemagick-6.7.0.9-1.2.src.rpm

 Mandriva Enterprise Server 5:
 f3aba495ee3a944e4e9ccafdfffac131  
mes5/i586/imagemagick-6.4.2.10-5.4mdvmes5.2.i586.rpm
 ba1858f1faf3c7e159ec8eebf558411a  
mes5/i586/imagemagick-desktop-6.4.2.10-5.4mdvmes5.2.i586.rpm
 74a73593b07d82332f9ed7a77a3317f7  
mes5/i586/imagemagick-doc-6.4.2.10-5.4mdvmes5.2.i586.rpm
 4d5d5b4b7de7dcb477e317ee9604c0c1  
mes5/i586/libmagick1-6.4.2.10-5.4mdvmes5.2.i586.rpm
 cae27a3fa3c1abfcac6495152622149d  
mes5/i586/libmagick-devel-6.4.2.10-5.4mdvmes5.2.i586.rpm
 9d892e3973d374a879ad033ac5a2fada  
mes5/i586/perl-Image-Magick-6.4.2.10-5.4mdvmes5.2.i586.rpm 
 98692ccd382085f7419e70475051173b  
mes5/SRPMS/imagemagick-6.4.2.10-5.4mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 cd0ff0a94a6e5aae6e205f7a28c68da3  
mes5/x86_64/imagemagick-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
 39046fb7ab97f63c6df0973a40fae4ce  
mes5/x86_64/imagemagick-desktop-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
 c63eca56b0a188f49f0584899e512049  
mes5/x86_64/imagemagick-doc-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
 03608e7eb8ba79563d091178b5de3b60  
mes5/x86_64/lib64magick1-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
 363f3f3375150377ada47a9f6be761b4  
mes5/x86_64/lib64magick-devel-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
 17bd98545b888e9d0a1c8e31058fea34  
mes5/x86_64/perl-Image-Magick-6.4.2.10-5.4mdvmes5.2.x86_64.rpm 
 98692ccd382085f7419e70475051173b  
mes5/SRPMS/imagemagick-6.4.2.10-5.4mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQbtqVmqjQ0CJFipgRAhYQAKDpLs02NTNkWBB63fg5bvubjTD4ygCeN3Bw
IQrU5w9Z06DMH2yFX4mPmdY=
=/48G
-----END PGP SIGNATURE-----

Reply via email to