From the imagemagick-developer mailing list (http://studio.imagemagick.org/pipermail/magick-developers/2004-August/002011.html): Marcus Meissner of Suse has discovered and patched a buffer overrun bug associated with decoding runlength-encoded BMP images. Since this could permit a security exploit, a new release with the this bug fixed is scheduled for release later today. Look for ImageMagick 6.0.6 at ftp://ftp.imageMagick.org/pub/ImageMagick by 5PM EST. It is recommended that all ImageMagick 6.0.? users upgrade. We will also release ImageMagick 5.5.7-27 with the same patch for users of the 5.5.7 series. Thanks to Marcus Meissner and Suse for bringing this exploit to our attention. __________ and (http://studio.imagemagick.org/pipermail/magick-developers/2004-August/002012.html) Correction, that would be ImageMagick 5.5.7-28. __________ see also bug #62229
Graphics herd: ImageMagick 6.0.6 released. Security team: not a lot of details as to what the vuln is, I'll try and see what I can come up with later. Blank whiteboard for now.
ChrisWhite asked me to look at this one briefly ... I'm going to be paranoid and mark it a B2 because it's not clear whether or not there is an ACE ("arbitrary code execution") problem. I skimmed bmp.c in the ImageMagick code, and I didn't see anything that looked obviously ACEish. We should perhaps send an email to upstream asking for more info.
submitted to OSVDB: http://www.osvdb.org/displayvuln.php?osvdb_id=9378
Graphics herd please bump ImageMagick to 6.0.6.
I've just added Imagemagick-6.0.7.1 to portage.
Reopening to mark stable. Arches please mark Imagemagick-6.0.7.1 stable.
sparc stable.
Aliz already marked stable on amd64.
Stable on amd64
stable on x86
Stable on alpha.
ppc stable
GLSA 200409-12 hppa,mips,ppc64 : mark stable to benefit from GLSA
hmm, i already had pushed hppa to stable, just forgot to comment :)
stable on ppc64, thanks!
oops forgot to remove ppc64
Stable on mips.