Articles / Debian: New imagemagick pac…

Debian: New imagemagick packages fix several vulnerabilities

Several vulnerabilities have been discovered in the imagemagick image manipulation programs which can lead to the execution of arbitrary code, exposure of sensitive information or cause DoS. Multiple integer overflows in the XInitImage function allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow. Multiple integer overflows allow remote attackers to execute arbitrary code via a crafted DCM image, or the colors or comments field in a crafted XWD image. A crafted image file can trigger an infinite loop in the ReadDCMImage function or in the ReadXCFImage function. Multiple integer overflows allow context-dependent attackers to execute arbitrary code via a crafted .dcm, .dib, .xbm, .xcf, or .xwd image file, which triggers a heap-based buffer overflow. An off-by-one error allows context-dependent attackers to execute arbitrary code via a crafted image file, which triggers the writing of a ‘\0’ character to an out-of-bounds address. A sign extension error allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow. The load_tile function in the XCF coder allows user-assisted remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted .xcf file that triggers an out-of-bounds heap write. A heap-based buffer overflow in the PCX coder allows user-assisted remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption. Integer overflow allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF file, which triggers a buffer overflow. Updated packages are available from security.debian.org.

—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA1


Debian Security Advisory DSA-1858-1 security@debian.org http://www.debian.org/security/ Luciano Bello

August 10, 2009 http://www.debian.org/security/faq

Package : imagemagick Vulnerability : multiple Problem type : local(remote) Debian-specific: no CVE Id(s) : CVE-2007-1667 CVE-2007-1797 CVE-2007-4985 CVE-2007-4986 CVE-2007-4987 CVE-2007-4988 CVE-2008-1096 CVE-2008-1097 CVE-2009-1882 Debian Bug : 418057 412945 444267 530838

Several vulnerabilities have been discovered in the imagemagick image manipulation programs which can lead to the execution of arbitrary code, exposure of sensitive information or cause DoS. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2007-1667

Multiple integer overflows in XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow. It only affects the oldstable distribution (etch).

CVE-2007-1797

Multiple integer overflows allow remote attackers to execute arbitrary code via a crafted DCM image, or the colors or comments field in a crafted XWD image. It only affects the oldstable distribution (etch).

CVE-2007-4985

A crafted image file can trigger an infinite loop in the ReadDCMImage function or in the ReadXCFImage function. It only affects the oldstable distribution (etch).

CVE-2007-4986

Multiple integer overflows allow context-dependent attackers to execute arbitrary code via a crafted .dcm, .dib, .xbm, .xcf, or .xwd image file, which triggers a heap-based buffer overflow. It only affects the
oldstable distribution (etch).

CVE-2007-4987

Off-by-one error allows context-dependent attackers to execute arbitrary code via a crafted image file, which triggers the writing of a ‘\0’ character to an out-of-bounds address. It affects only the oldstable distribution (etch).

CVE-2007-4988

A sign extension error allows context-dependent attackers to execute
arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow. It affects only the oldstable distribution (etch).

CVE-2008-1096

The loadtile function in the XCF coder allows user-assisted remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted .xcf file that triggers an out-of-bounds heap write. It affects only to oldstable (etch).

CVE-2008-1097

Heap-based buffer overflow in the PCX coder allows user-assisted remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption. It affects only to oldstable (etch).

CVE-2009-1882

Integer overflow allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF file, which triggers a buffer overflow.

For the old stable distribution (etch), these problems have been fixed in version 7:6.2.4.5.dfsg1-0.15+etch1.

For the stable distribution (lenny), these problems have been fixed in version 7:6.3.7.9.dfsg2-1~lenny3.

For the upcoming stable distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 7:6.5.1.0-1.1.

We recommend that you upgrade your imagemagick packages.

Upgrade instructions

wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update will update the internal database apt-get upgrade will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.2.4.5.dfsg1-0.15+etch1.tar.gz Size/MD5 checksum: 5202678 cbb51d6956c6dd68f7dfaa068d0b416b http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.2.4.5.dfsg1-0.15+etch1.dsc Size/MD5 checksum: 958 6c8ffe1f0d0efab6652070aabd8fab8d

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9c2a6.2.4.5.dfsg1-0.15+etch1alpha.deb Size/MD5 checksum: 189542 1aa917c2f494952622bcd089655f7b3b http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.2.4.5.dfsg1-0.15+etch1alpha.deb Size/MD5 checksum: 2449862 be4d146061a0211fc3070c8461c43539 http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.2.4.5.dfsg1-0.15+etch1alpha.deb Size/MD5 checksum: 743324 75350c6eb5143f5dee7fe31a01e9a410 http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.2.4.5.dfsg1-0.15+etch1alpha.deb Size/MD5 checksum: 174690 d024ad2524f15fa889df8e34f3a900ae http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.2.4.5.dfsg1-0.15+etch1alpha.deb Size/MD5 checksum: 305632 0e5fea24e12ad7b5951ffb24d01f5a50 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick96.2.4.5.dfsg1-0.15+etch1alpha.deb Size/MD5 checksum: 1391130 8ad3f625613017b1ff977d319feddf7c

amd64 architecture (AMD x8664 (AMD64))

http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.2.4.5.dfsg1-0.15+etch1amd64.deb Size/MD5 checksum: 744738 78e3cfa4a31075f823bc28403f5d67c5 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.2.4.5.dfsg1-0.15+etch1amd64.deb Size/MD5 checksum: 248658 6bb3f532d90ed4cdd7ca59d9cebfe701 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9c2a6.2.4.5.dfsg1-0.15+etch1amd64.deb Size/MD5 checksum: 172718 600e69985df7aef9e5fd776fdfc3b738 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.2.4.5.dfsg1-0.15+etch1amd64.deb Size/MD5 checksum: 1676998 c713077e98f9176de77ce5c58f00d2bc http://security.debian.org/pool/updates/main/i/imagemagick/libmagick96.2.4.5.dfsg1-0.15+etch1amd64.deb Size/MD5 checksum: 1324236 ce92217fb065842e2ab9a7f3ac970e55 http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.2.4.5.dfsg1-0.15+etch1amd64.deb Size/MD5 checksum: 173408 98e699079a51b04a90c3f40792b9be80

arm architecture (ARM)

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.2.4.5.dfsg1-0.15+etch1arm.deb Size/MD5 checksum: 1626758 5186c4434b3545b12abefa15fb7b470e http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.2.4.5.dfsg1-0.15+etch1arm.deb Size/MD5 checksum: 750528 88d58370346dcfbdb7ffd8496ef8ec4c http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.2.4.5.dfsg1-0.15+etch1arm.deb Size/MD5 checksum: 170052 c461b7b5306e32f2dc385fbdf52c5d7f http://security.debian.org/pool/updates/main/i/imagemagick/libmagick96.2.4.5.dfsg1-0.15+etch1arm.deb Size/MD5 checksum: 1342082 edd1fce3588b7c32fb78d2a8eaa1c0c2 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.2.4.5.dfsg1-0.15+etch1arm.deb Size/MD5 checksum: 247980 603ec16ac3c1306d41856cf536930a96 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9c2a6.2.4.5.dfsg1-0.15+etch1arm.deb Size/MD5 checksum: 160332 fd405cbc70e2918901df36286cf9d666

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.2.4.5.dfsg1-0.15+etch1hppa.deb Size/MD5 checksum: 746376 c004fb6755320fe156bdeea5f0a7c59e http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.2.4.5.dfsg1-0.15+etch1hppa.deb Size/MD5 checksum: 183142 4a95a974b46d027c2de2850c698515d1 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.2.4.5.dfsg1-0.15+etch1hppa.deb Size/MD5 checksum: 2055750 1b2da69dc17f5501146203e7ac10223d http://security.debian.org/pool/updates/main/i/imagemagick/libmagick96.2.4.5.dfsg1-0.15+etch1hppa.deb Size/MD5 checksum: 1495548 8760765e809da00d35f4aa39f8417f46 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9c2a6.2.4.5.dfsg1-0.15+etch1hppa.deb Size/MD5 checksum: 198210 57cc94c9786b84365cad988df21dac05 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.2.4.5.dfsg1-0.15+etch1hppa.deb Size/MD5 checksum: 286134 910570702fda0378973650315eff0b65

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.2.4.5.dfsg1-0.15+etch1i386.deb Size/MD5 checksum: 745936 1e40ed75296c5446e7f827662cb2490a http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.2.4.5.dfsg1-0.15+etch1i386.deb Size/MD5 checksum: 1640482 fe033745104b08e6ac962a1eef3332f7 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9c2a6.2.4.5.dfsg1-0.15+etch1i386.deb Size/MD5 checksum: 179658 87d4d44a22cfed4283420a0d58b33c20 http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.2.4.5.dfsg1-0.15+etch1i386.deb Size/MD5 checksum: 170978 64b62cf6a14fdb016f2175d2f2944977 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.2.4.5.dfsg1-0.15+etch1i386.deb Size/MD5 checksum: 229176 8b431753808c82a4b4b537aa964dd558 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick96.2.4.5.dfsg1-0.15+etch1i386.deb Size/MD5 checksum: 1299682 73e5155f242af1d2d16e2e4458d9539f

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.2.4.5.dfsg1-0.15+etch1ia64.deb Size/MD5 checksum: 205920 ad4d2d775f95da68f24321ff75734962 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick96.2.4.5.dfsg1-0.15+etch1ia64.deb Size/MD5 checksum: 1834728 30e0b78747581fc10b33cc4fa35e8f6f http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.2.4.5.dfsg1-0.15+etch1ia64.deb Size/MD5 checksum: 321316 47b87d4b5338ca999b3f7451c311de09 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.2.4.5.dfsg1-0.15+etch1ia64.deb Size/MD5 checksum: 2490906 cad083bd9ede9fbf3b3bfa14d3a2ea61 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9c2a6.2.4.5.dfsg1-0.15+etch1ia64.deb Size/MD5 checksum: 198376 94cf7ae07c223a1f500293f9caf20940 http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.2.4.5.dfsg1-0.15+etch1ia64.deb Size/MD5 checksum: 741428 a55baa17258cd8a63b0fb3be44a0db4d

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.2.4.5.dfsg1-0.15+etch1mips.deb Size/MD5 checksum: 142952 b1352f4d11ebb3f7aa8e9b00e7ef8fe2 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.2.4.5.dfsg1-0.15+etch1mips.deb Size/MD5 checksum: 275890 2df971bab450e39c4fad12d54e0fe7db http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.2.4.5.dfsg1-0.15+etch1mips.deb Size/MD5 checksum: 752374 2fb624ff0a45ca9caf2236be7dcd3d83 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9c2a6.2.4.5.dfsg1-0.15+etch1mips.deb Size/MD5 checksum: 175760 f71be7b0921aeca25c29b46cda2cd9e2 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.2.4.5.dfsg1-0.15+etch1mips.deb Size/MD5 checksum: 2055384 b8f65bf7cda5ee0453b2423e023cb253 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick96.2.4.5.dfsg1-0.15+etch1mips.deb Size/MD5 checksum: 1266780 7bdeee5dfa4574ed71d8f87c01ae9289

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.2.4.5.dfsg1-0.15+etch1mipsel.deb Size/MD5 checksum: 142900 9ece29fcb2571d154f2784087191527e http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.2.4.5.dfsg1-0.15+etch1mipsel.deb Size/MD5 checksum: 740304 7df92dc094e334616277130e1f99003c http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.2.4.5.dfsg1-0.15+etch1mipsel.deb Size/MD5 checksum: 268500 a6e33f71964d78f912ec62368741fcd4 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick96.2.4.5.dfsg1-0.15+etch1mipsel.deb Size/MD5 checksum: 1257890 950314430566c9c0caa36b1f490d4c09 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.2.4.5.dfsg1-0.15+etch1mipsel.deb Size/MD5 checksum: 2027730 2c670703f9258a1f8c7d6d4ffd908946 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9c2a6.2.4.5.dfsg1-0.15+etch1mipsel.deb Size/MD5 checksum: 169860 30ec4ba83a713e1d67cfff990acc6076

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.2.4.5.dfsg1-0.15+etch1powerpc.deb Size/MD5 checksum: 753702 dd63dea258aa7c9238e5e0e23ff967ef http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.2.4.5.dfsg1-0.15+etch1powerpc.deb Size/MD5 checksum: 1913062 9e21aef4686620ef9a4c80320622e2ec http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.2.4.5.dfsg1-0.15+etch1powerpc.deb Size/MD5 checksum: 253638 85ed0945b741ad5a67ddac348f5c75e0 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9c2a6.2.4.5.dfsg1-0.15+etch1powerpc.deb Size/MD5 checksum: 175528 d421ef576cee1579b7268ba85fcdbf6f http://security.debian.org/pool/updates/main/i/imagemagick/libmagick96.2.4.5.dfsg1-0.15+etch1powerpc.deb Size/MD5 checksum: 1293220 c585cb718dde59b7fdad61919885bd64 http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.2.4.5.dfsg1-0.15+etch1powerpc.deb Size/MD5 checksum: 170726 62c31b47961aa0a88035332005fb47fd

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.2.4.5.dfsg1-0.15+etch1sparc.deb Size/MD5 checksum: 1811074 7316a4ff8c9bdc0e670465fd9f05093b http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9c2a6.2.4.5.dfsg1-0.15+etch1sparc.deb Size/MD5 checksum: 178722 3f4cb9bb91d393fb9cf0424442878a56 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick96.2.4.5.dfsg1-0.15+etch1sparc.deb Size/MD5 checksum: 1349492 8f4b9bbe16aed899986209a6caf01e12 http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.2.4.5.dfsg1-0.15+etch1sparc.deb Size/MD5 checksum: 171346 c33190150654346ca72f3c90d90460aa http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.2.4.5.dfsg1-0.15+etch1sparc.deb Size/MD5 checksum: 231394 a9ee8c289492d1a9fa71ed46c5fdcc11 http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.2.4.5.dfsg1-0.15+etch1sparc.deb Size/MD5 checksum: 744650 a1d3355e29a0a19e53af26614973343f

Debian GNU/Linux 5.0 alias lenny

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2.orig.tar.gz Size/MD5 checksum: 8227844 14425de4d5d78b7726973af967e1f9e6 http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3.dsc Size/MD5 checksum: 1714 22f4afd84d6362ebceb44ceaead527b9 http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3.diff.gz Size/MD5 checksum: 88277 49ac2394a701ce7bf273dfa76d27b24d

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++106.3.7.9.dfsg2-1~lenny3alpha.deb Size/MD5 checksum: 181968 3aadc707b9192b7c039de7a72932111b http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.3.7.9.dfsg2-1~lenny3alpha.deb Size/MD5 checksum: 1898628 107d3ef6054b0a589091ceeb4340f6ab http://security.debian.org/pool/updates/main/i/imagemagick/libmagick106.3.7.9.dfsg2-1~lenny3alpha.deb Size/MD5 checksum: 4628066 37e0318f146d4313a918b25cc671f160 http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3alpha.deb Size/MD5 checksum: 1432042 ac62088a4c997808728056ac925faf97 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.3.7.9.dfsg2-1~lenny3alpha.deb Size/MD5 checksum: 267382 d1379dee6ffc48a1efaaa3c2fe70808a http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.3.7.9.dfsg2-1~lenny3alpha.deb Size/MD5 checksum: 171210 8dae3357eab41498de07aa7d88ed4579

amd64 architecture (AMD x8664 (AMD64))

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.3.7.9.dfsg2-1~lenny3amd64.deb Size/MD5 checksum: 218116 709bfbffb93bd84a08a8db7b21415ad1 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick106.3.7.9.dfsg2-1~lenny3amd64.deb Size/MD5 checksum: 4262726 f9a3cefff5e0821aa125a4b8d540f1bc http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++106.3.7.9.dfsg2-1~lenny3amd64.deb Size/MD5 checksum: 170128 5dcfcd517a7f5ce962038e66020facf3 http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.3.7.9.dfsg2-1~lenny3amd64.deb Size/MD5 checksum: 175482 25868b065192977e98d6e99b515451a3 http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3amd64.deb Size/MD5 checksum: 1430600 0bd5eaa495a9c94383f1f15560477891 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.3.7.9.dfsg2-1~lenny3amd64.deb Size/MD5 checksum: 1296334 4db706d5d837f7065e53ce6a59252155

armel architecture (ARM EABI)

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick106.3.7.9.dfsg2-1~lenny3armel.deb Size/MD5 checksum: 4311026 b871957de2ee6acac4ebaa45fb2c5f10 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++106.3.7.9.dfsg2-1~lenny3armel.deb Size/MD5 checksum: 137614 a35026505345301ffeb7d5e68fb75c42 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.3.7.9.dfsg2-1~lenny3armel.deb Size/MD5 checksum: 211706 26c51ab1da0c47d1d435c7dd2a7796f8 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.3.7.9.dfsg2-1~lenny3armel.deb Size/MD5 checksum: 1330996 7106d299f6e27555ccb0f12de7dfb70f http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.3.7.9.dfsg2-1~lenny3armel.deb Size/MD5 checksum: 173464 699512df028745d69a5c12a193b30008 http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3armel.deb Size/MD5 checksum: 1429912 8e2f973287c9131ed84c8f97971ed751

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.3.7.9.dfsg2-1~lenny3hppa.deb Size/MD5 checksum: 1549708 7a44aaffbc4591317894735f2573e086 http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3hppa.deb Size/MD5 checksum: 1431268 38df677bd5d28514ce9b405ade7d5835 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick106.3.7.9.dfsg2-1~lenny3hppa.deb Size/MD5 checksum: 4814288 fba39ae5de217b78aebe796bc97c43fb http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.3.7.9.dfsg2-1~lenny3hppa.deb Size/MD5 checksum: 184682 3b32b5b832b02879913c697335b40457 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.3.7.9.dfsg2-1~lenny3hppa.deb Size/MD5 checksum: 253974 20901e88f1fecbae4b164df1ed84837d http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++106.3.7.9.dfsg2-1~lenny3hppa.deb Size/MD5 checksum: 183022 7b0793c628915bea83a5729f793e42ab

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.3.7.9.dfsg2-1~lenny3i386.deb Size/MD5 checksum: 170000 9246afbdf5752af72e1ae72fb2cef44b http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.3.7.9.dfsg2-1~lenny3i386.deb Size/MD5 checksum: 202288 c70896121f72ba54e6cde6fe39a880e9 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick106.3.7.9.dfsg2-1~lenny3i386.deb Size/MD5 checksum: 4027048 3dac656cd42811ff7c57e39a37992f28 http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3i386.deb Size/MD5 checksum: 1428358 b6770fe23b426f787145f155ecc96cbf http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++106.3.7.9.dfsg2-1~lenny3i386.deb Size/MD5 checksum: 174864 ef32b51ff99d7b2f2b1948710024349f http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.3.7.9.dfsg2-1~lenny3i386.deb Size/MD5 checksum: 1195668 70bc31bb80ec24755d3ee398db3599d8

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.3.7.9.dfsg2-1~lenny3ia64.deb Size/MD5 checksum: 1894036 4faae563bd3fa34e3856b383da6ac521 http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.3.7.9.dfsg2-1~lenny3ia64.deb Size/MD5 checksum: 209730 4af71cf9896c8c7bc3b916fbb9ea0f7f http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.3.7.9.dfsg2-1~lenny3ia64.deb Size/MD5 checksum: 252278 ec6146ad2c770ba54fb73f4951e9b333 http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3ia64.deb Size/MD5 checksum: 1425362 eb1d7956703ede87eac1da6feaef6f86 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick106.3.7.9.dfsg2-1~lenny3ia64.deb Size/MD5 checksum: 5128410 1a6ccd8968f4d9c1a81c354614bc2385 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++106.3.7.9.dfsg2-1~lenny3ia64.deb Size/MD5 checksum: 183230 26e3be3728f39c56c5187a38643fbf6c

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.3.7.9.dfsg2-1~lenny3mips.deb Size/MD5 checksum: 1592960 32ab2973c03e09abadcc72e10e72ca37 http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.3.7.9.dfsg2-1~lenny3mips.deb Size/MD5 checksum: 155468 1c5df542ba5780ad2f4bc7d1aec08d8c http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3mips.deb Size/MD5 checksum: 1423596 110ffbf34eb8d07b1a4a9d6f644d814f http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.3.7.9.dfsg2-1~lenny3mips.deb Size/MD5 checksum: 236598 f86dc42c9c9e1220d4fe35361722a5b0 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++106.3.7.9.dfsg2-1~lenny3mips.deb Size/MD5 checksum: 157138 b1001d46968ccb19917c5448cd121958 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick106.3.7.9.dfsg2-1~lenny3mips.deb Size/MD5 checksum: 4177824 da3c1b4a9b0eb0479d23142a1e5aecca

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3mipsel.deb Size/MD5 checksum: 1423542 c3fe8bf49f9471b84e44c41ed87c8763 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick106.3.7.9.dfsg2-1~lenny3mipsel.deb Size/MD5 checksum: 4116618 68f90a47f4d038683d799625f1444338 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++106.3.7.9.dfsg2-1~lenny3mipsel.deb Size/MD5 checksum: 151592 bee2279e2baa348142613cf249f5d8d4 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.3.7.9.dfsg2-1~lenny3mipsel.deb Size/MD5 checksum: 1576970 b9d5ee5a59ec4fb016e3ca846ebbe105 http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.3.7.9.dfsg2-1~lenny3mipsel.deb Size/MD5 checksum: 154796 d91c3a37a413d97f0caa96cf2d706de6 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.3.7.9.dfsg2-1~lenny3mipsel.deb Size/MD5 checksum: 233142 7366c9f8ca5c9d60b3c6b923cef0cb8e

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.3.7.9.dfsg2-1~lenny3powerpc.deb Size/MD5 checksum: 1461172 698ad0d3857875447f364dc497056e34 http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.3.7.9.dfsg2-1~lenny3powerpc.deb Size/MD5 checksum: 172188 c55a17ccba4739286a3d06e412a37c7e http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3powerpc.deb Size/MD5 checksum: 1432568 46558be9be9d26fd5528c6a2ec7d50a3 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.3.7.9.dfsg2-1~lenny3powerpc.deb Size/MD5 checksum: 225840 ebf6710bcf60ffd8c5f1721476df93cc http://security.debian.org/pool/updates/main/i/imagemagick/libmagick106.3.7.9.dfsg2-1~lenny3powerpc.deb Size/MD5 checksum: 4555502 4d6dc45e0541aa4b33e1313b19a9dca6 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++106.3.7.9.dfsg2-1~lenny3powerpc.deb Size/MD5 checksum: 183318 570ca54165f4603b707b4b5c1a8291a9

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick106.3.7.9.dfsg2-1~lenny3s390.deb Size/MD5 checksum: 4898598 7aab488bf8b2e26552a44e4eaa4b36ca http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.3.7.9.dfsg2-1~lenny3s390.deb Size/MD5 checksum: 165968 b3baeeb34331fee9bf6ad7816a850b5f http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3s390.deb Size/MD5 checksum: 1423042 5c18ab69a9a57c6ab91de017f1c11421 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++106.3.7.9.dfsg2-1~lenny3s390.deb Size/MD5 checksum: 171208 c0c84e6f818e6fea609d313fafe9d02f http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.3.7.9.dfsg2-1~lenny3s390.deb Size/MD5 checksum: 1249678 40bf0a5fc997df2032bfa14b52e49feb http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.3.7.9.dfsg2-1~lenny3s390.deb Size/MD5 checksum: 216898 9ab3e6b083115bebf395a10a1a31620a

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++106.3.7.9.dfsg2-1~lenny3sparc.deb Size/MD5 checksum: 169848 780d886a56b53d47c39ce8f9d33810d3 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick9-dev6.3.7.9.dfsg2-1~lenny3sparc.deb Size/MD5 checksum: 1355378 9a8731c1d39fe9884d6ca583a8fb7e30 http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick6.3.7.9.dfsg2-1~lenny3sparc.deb Size/MD5 checksum: 173572 fbf9df5c0d20728dd084c7c4404b8fc2 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++9-dev6.3.7.9.dfsg2-1~lenny3sparc.deb Size/MD5 checksum: 204504 e6d21927050ba1bd4da56777544ccabc http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick6.3.7.9.dfsg2-1~lenny3sparc.deb Size/MD5 checksum: 1431724 e6512b716fa3e669e7c86e5879998438 http://security.debian.org/pool/updates/main/i/imagemagick/libmagick106.3.7.9.dfsg2-1~lenny3sparc.deb Size/MD5 checksum: 4187838 22f6eb7829ab478d045eda07bafa7bc9

These files will probably be moved into the stable distribution on its next update.


For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkqAUvsACgkQXm3vHE4uyloPtgCgisRHLmW4bHQ1ZPGbbJbbG8gv

0NUAnjwuH7SO7qJ1pQnDxYCTjQN4jA9l

—–END PGP SIGNATURE—–

Screenshot

Project Spotlight

Kigo Video Converter Ultimate for Mac

A tool for converting and editing videos.

Screenshot

Project Spotlight

Kid3

An efficient tagger for MP3, Ogg/Vorbis, and FLAC files.