stable

ImageMagick-6.9.12.93-1.fc37

FEDORA-2023-edbdccae2a created by sergiomb 11 months ago for Fedora 37

Update ImageMagick to 6.9.12.93

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2023-edbdccae2a

This update has been submitted for testing by sergiomb.

11 months ago

This update's test gating status has been changed to 'ignored'.

11 months ago

sergiomb edited this update.

11 months ago

sergiomb edited this update.

11 months ago

This update has been pushed to testing.

11 months ago

This update has been submitted for stable by bodhi.

11 months ago

This update has been pushed to stable.

11 months ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
11 months ago
in testing
11 months ago
in stable
11 months ago
modified
11 months ago
approved
11 months ago
BZ#2210657 CVE-2023-34151 ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders
0
0
BZ#2210659 CVE-2023-34152 ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured
0
0
BZ#2210660 CVE-2023-34153 ImageMagick: Shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding
0
0
BZ#2210662 CVE-2023-34153 ImageMagick: Shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding [fedora-37]
0
0
BZ#2210665 CVE-2023-34152 ImageMagick: RCE (shell command injection) vulnerability in OpenBlob with --enable-pipes configured [fedora-37]
0
0
BZ#2210668 CVE-2023-34151 ImageMagick: Undefined behaviors of casting double to size_t in svg, mvg and other coders [fedora-37]
0
0
BZ#2214141 CVE-2023-3195 ImageMagick: stack overflow in coders/tiff.c while parsing malicious tiff file
0
0
BZ#2214142 CVE-2023-3195 ImageMagick: stack overflow in coders/tiff.c while parsing malicious tiff file [fedora-37]
0
0
BZ#2214148 CVE-2023-34474 ImageMagick: heap-based buffer overflow in ReadTIM2ImageData() function in coders/tim2.c
0
0
BZ#2214149 CVE-2023-34475 ImageMagick: heap use-after-free issue in ReplaceXmpValue() function in MagickCore/profile.c.
0
0
BZ#2214154 CVE-2023-34474 ImageMagick: heap-based buffer overflow in ReadTIM2ImageData() function in coders/tim2.c [fedora-37]
0
0
BZ#2214155 CVE-2023-34475 ImageMagick: heap use-after-free issue in ReplaceXmpValue() function in MagickCore/profile.c. [fedora-37]
0
0
BZ#2218369 CVE-2023-3428 ImageMagick: heap-buffer-overflow in coders/tiff.c
0
0
BZ#2218371 CVE-2023-3428 ImageMagick: heap-buffer-overflow in coders/tiff.c [fedora-all]
0
0
BZ#2230713 CVE-2023-39978 ImageMagick: Memory leak in Magick::Draw
0
0
BZ#2230714 CVE-2023-39978 ImageMagick: Memory leak in Magick::Draw [fedora-all]
0
0

Automated Test Results