The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of ImageMagick: memory leak via SVGKeyValuePairs

Synthesis of the vulnerability 

An attacker can create a memory leak via SVGKeyValuePairs() of ImageMagick, in order to trigger a denial of service.
Impacted products: Debian, Ubuntu.
Severity of this bulletin: 2/4.
Creation date: 26/06/2019.
Références of this threat: CVE-2019-10649, DSA-4712-1, USN-4034-1, VIGILANCE-VUL-29625.

Description of the vulnerability 

An attacker can create a memory leak via SVGKeyValuePairs() of ImageMagick, in order to trigger a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity alert impacts software or systems such as Debian, Ubuntu.

Our Vigil@nce team determined that the severity of this weakness is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this security weakness.

Solutions for this threat 

Debian 10: new imagemagick packages.
New packages are available:
  Debian 10: imagemagick 8:6.9.10.23+dfsg-2.1+deb10u1

Ubuntu: new ImageMagick packages.
New packages are available:
  Ubuntu 19.04: imagemagick 8:6.9.10.14+dfsg-7ubuntu2.2
  Ubuntu 18.10: imagemagick 8:6.9.10.8+dfsg-1ubuntu2.2
  Ubuntu 18.04 LTS: imagemagick 8:6.9.7.4+dfsg-16ubuntu6.7
  Ubuntu 16.04 LTS: imagemagick 8:6.8.9.9-7ubuntu5.14
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a system vulnerability patch. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.