Mageia alert MGASA-2016-0325 (graphicsmagick)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2016-0325: Updated graphicsmagick packages fix security vulnerability | |
| Date: | Wed, 28 Sep 2016 07:59:55 +0200 | |
| Message-ID: | <20160928055955.55FCA9F793@duvel.mageia.org> |
MGASA-2016-0325 - Updated graphicsmagick packages fix security vulnerability Publication date: 28 Sep 2016 URL: http://advisories.mageia.org/MGASA-2016-0325.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-7447, CVE-2016-7448, CVE-2016-7449 Description: A possible heap overflow of the EscapeParenthesis() function (CVE-2016-7447). The Utah RLE reader did not validate that header information was reasonable given the file size and so it could cause huge memory allocations and/or consume huge amounts of CPU (CVE-2016-7448). The TIFF reader had a bug pertaining to use of TIFFGetField() when a 'count' value is returned. The bug caused a heap read overflow (due to using strlcpy() to copy a possibly unterminated string) which could allow an untrusted file to crash the software (CVE-2016-7449). References: - https://bugs.mageia.org/show_bug.cgi?id=19302 - http://openwall.com/lists/oss-security/2016/09/18/8 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7447 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7448 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7449 SRPMS: - 5/core/graphicsmagick-1.3.25-1.mga5
