|
|
Log in / Subscribe / Register

Mageia alert MGASA-2016-0325 (graphicsmagick)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0325: Updated graphicsmagick packages fix security vulnerability
Date:  Wed, 28 Sep 2016 07:59:55 +0200
Message-ID:  <20160928055955.55FCA9F793@duvel.mageia.org>

MGASA-2016-0325 - Updated graphicsmagick packages fix security vulnerability Publication date: 28 Sep 2016 URL: http://advisories.mageia.org/MGASA-2016-0325.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-7447, CVE-2016-7448, CVE-2016-7449 Description: A possible heap overflow of the EscapeParenthesis() function (CVE-2016-7447). The Utah RLE reader did not validate that header information was reasonable given the file size and so it could cause huge memory allocations and/or consume huge amounts of CPU (CVE-2016-7448). The TIFF reader had a bug pertaining to use of TIFFGetField() when a 'count' value is returned. The bug caused a heap read overflow (due to using strlcpy() to copy a possibly unterminated string) which could allow an untrusted file to crash the software (CVE-2016-7449). References: - https://bugs.mageia.org/show_bug.cgi?id=19302 - http://openwall.com/lists/oss-security/2016/09/18/8 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7447 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7448 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7449 SRPMS: - 5/core/graphicsmagick-1.3.25-1.mga5


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds