Debian Security Advisory

DLA-1082-1 graphicsmagick -- LTS security update

Date Reported:
31 Aug 2017
Affected Packages:
graphicsmagick
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2017-12935, CVE-2017-12936, CVE-2017-12937, CVE-2017-13063, CVE-2017-13064, CVE-2017-13065, CVE-2017-13776, CVE-2017-13777.
More information:
  • CVE-2017-13776 / CVE-2017-13777

    denial of service issue in ReadXBMImage()

  • CVE-2017-12935

    The ReadMNGImage function in coders/png.c mishandles large MNG images, leading to an invalid memory read in the SetImageColorCallBack function in magick/image.c.

  • CVE-2017-12936

    The ReadWMFImage function in coders/wmf.c has a use-after-free issue for data associated with exception reporting.

  • CVE-2017-12937

    The ReadSUNImage function in coders/sun.c has a colormap heap-based buffer over-read.

  • CVE-2017-13063 / CVE-2017-13064

    heap-based buffer overflow vulnerability in the function GetStyleTokens in coders/svg.c

  • CVE-2017-13065

    NULL pointer dereference vulnerability in the function SVGStartElement in coders/svg.c

For Debian 7 Wheezy, these problems have been fixed in version 1.3.16-1.1+deb7u9.

We recommend that you upgrade your graphicsmagick packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS