MGASA-2019-0033

Source
https://advisories.mageia.org/MGASA-2019-0033.html
Import Source
https://advisories.mageia.org/MGASA-2019-0033.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0033
Related
Published
2019-01-11T21:07:56Z
Modified
2019-01-11T20:40:06Z
Summary
Updated graphicsmagick packages fix security vulnerabilities
Details

It was discovered that graphicsmagick was subject to vulnerabilites. * heap-based buffer overflow in the WriteTGAImage function of tga.c (CVE-2018-20184). * denial of service vulnerability in ReadDIBImage function of coders/dib.c (CVE-2018-20189). * heap-based buffer over-read in the ReadBMPImage function of bmp.c (CVE-2018-20185).

References
Credits

Affected packages

Mageia:6 / graphicsmagick

Package

Name
graphicsmagick
Purl
pkg:rpm/mageia/graphicsmagick?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.31-1.3.mga6

Ecosystem specific

{
    "section": "core"
}