Debian Security Advisory
DLA-1082-1 graphicsmagick -- LTS security update
- Date Reported:
- 31 Aug 2017
- Affected Packages:
- graphicsmagick
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2017-12935, CVE-2017-12936, CVE-2017-12937, CVE-2017-13063, CVE-2017-13064, CVE-2017-13065, CVE-2017-13776, CVE-2017-13777.
- More information:
-
- CVE-2017-13776 /
CVE-2017-13777
denial of service issue in ReadXBMImage()
- CVE-2017-12935
The ReadMNGImage function in coders/png.c mishandles large MNG images, leading to an invalid memory read in the SetImageColorCallBack function in magick/image.c.
- CVE-2017-12936
The ReadWMFImage function in coders/wmf.c has a use-after-free issue for data associated with exception reporting.
- CVE-2017-12937
The ReadSUNImage function in coders/sun.c has a colormap heap-based buffer over-read.
- CVE-2017-13063 /
CVE-2017-13064
heap-based buffer overflow vulnerability in the function GetStyleTokens in coders/svg.c
- CVE-2017-13065
NULL pointer dereference vulnerability in the function SVGStartElement in coders/svg.c
For Debian 7
Wheezy
, these problems have been fixed in version 1.3.16-1.1+deb7u9.We recommend that you upgrade your graphicsmagick packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2017-13776 /
CVE-2017-13777