Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.852052 |
Categoría: | SuSE Local Security Checks |
Título: | openSUSE: Security Advisory for Recommended (openSUSE-SU-2018:1421-1) |
Resumen: | The remote host is missing an update for the 'Recommended'; package(s) announced via the openSUSE-SU-2018:1421-1 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'Recommended' package(s) announced via the openSUSE-SU-2018:1421-1 advisory. Vulnerability Insight: GraphicsMagick was updated to 1.3.29: * Security Fixes: - GraphicsMagick is now participating in Google's oss-fuzz project - JNG: Require that the embedded JPEG image have the same dimensions as the JNG image as provided by JHDR. Avoids a heap write overflow. - MNG: Arbitrarily limit the number of loops which may be requested by the MNG LOOP chunk to 512 loops, and provide the '-define mng:maximum-loops=value' option in case the user wants to change the limit. This fixes a denial of service caused by large LOOP specifications. * Bug fixes: - DICOM: Pre/post rescale functions are temporarily disabled (until the implementation is fixed). - JPEG: Fix regression in last release in which reading some JPEG files produces the error 'Improper call to JPEG library in state 201'. - ICON: Some DIB-based Windows ICON files were reported as corrupt to an unexpectedly missing opacity mask image. - In-memory Blob I/O: Don't implicitly increase the allocation size due to seek offsets. - MNG: Detect and handle failure to allocate global PLTE. Fix divide by zero. - DrawGetStrokeDashArray(): Check for failure to allocate memory. - BlobToImage(): Now produces useful exception reports to cover the cases where 'magick' was not set and the file format could not be deduced from its header. * API Updates: - Wand API: Added MagickIsPaletteImage(), MagickIsOpaqueImage(), MagickIsMonochromeImage(), MagickIsGrayImage(), MagickHasColormap() based on contributions by Troy Patteson. - New structure ImageExtra added and Image 'clip_mask' member is replaced by 'extra' which points to private ImageExtra allocation. The ImageGetClipMask() function now provides access to the clip mask image. - New structure DrawInfoExtra and DrawInfo 'clip_path' is replaced by 'extra' which points to private DrawInfoExtra allocation. The DrawInfoGetClipPath() function now provides access to the clip path. - New core library functions: GetImageCompositeMask(), CompositeMaskImage(), CompositePathImage(), SetImageCompositeMask(), ImageGetClipMask(), ImageGetCompositeMask(), DrawInfoGetClipPath(), DrawInfoGetCompositePath() - Deprecated core library functions: RegisterStaticModules(), UnregisterStaticModules(). * Feature improvements: - Static modules (in static library or shared library without dynamically loadable modules) are now lazy-loaded using the same external interface as the lazy-loader for dynamic modules. This results in more similarity between the builds and reduces the fixed initialization overhead by only initializing th ... Description truncated, please see the referenced URL(s) for more information. Affected Software/OS: Recommended on openSUSE Leap 15.0. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Copyright | Copyright (C) 2018 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |