MGASA-2016-0325

Source
https://advisories.mageia.org/MGASA-2016-0325.html
Import Source
https://advisories.mageia.org/MGASA-2016-0325.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0325
Related
Published
2016-09-28T05:59:24Z
Modified
2016-09-28T05:50:18Z
Summary
Updated graphicsmagick packages fix security vulnerability
Details

A possible heap overflow of the EscapeParenthesis() function (CVE-2016-7447).

The Utah RLE reader did not validate that header information was reasonable given the file size and so it could cause huge memory allocations and/or consume huge amounts of CPU (CVE-2016-7448).

The TIFF reader had a bug pertaining to use of TIFFGetField() when a 'count' value is returned. The bug caused a heap read overflow (due to using strlcpy() to copy a possibly unterminated string) which could allow an untrusted file to crash the software (CVE-2016-7449).

References
Credits

Affected packages

Mageia:5 / graphicsmagick

Package

Name
graphicsmagick
Purl
pkg:rpm/mageia/graphicsmagick?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.25-1.mga5

Ecosystem specific

{
    "section": "core"
}