An issue was discovered in GraphicsMagick 1.3.26. An allocation failure vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allows attackers to cause a denial of service via a crafted file, because file size is not properly used to restrict scanline, strip, and tile allocations.
{
"binaries": [
{
"binary_name": "graphicsmagick",
"binary_version": "1.3.18-1ubuntu3.1+esm6"
},
{
"binary_name": "graphicsmagick-imagemagick-compat",
"binary_version": "1.3.18-1ubuntu3.1+esm6"
},
{
"binary_name": "graphicsmagick-libmagick-dev-compat",
"binary_version": "1.3.18-1ubuntu3.1+esm6"
},
{
"binary_name": "libgraphics-magick-perl",
"binary_version": "1.3.18-1ubuntu3.1+esm6"
},
{
"binary_name": "libgraphicsmagick++1-dev",
"binary_version": "1.3.18-1ubuntu3.1+esm6"
},
{
"binary_name": "libgraphicsmagick++3",
"binary_version": "1.3.18-1ubuntu3.1+esm6"
},
{
"binary_name": "libgraphicsmagick1-dev",
"binary_version": "1.3.18-1ubuntu3.1+esm6"
},
{
"binary_name": "libgraphicsmagick3",
"binary_version": "1.3.18-1ubuntu3.1+esm6"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"binaries": [
{
"binary_name": "graphicsmagick",
"binary_version": "1.3.23-1ubuntu0.6"
},
{
"binary_name": "graphicsmagick-imagemagick-compat",
"binary_version": "1.3.23-1ubuntu0.6"
},
{
"binary_name": "graphicsmagick-libmagick-dev-compat",
"binary_version": "1.3.23-1ubuntu0.6"
},
{
"binary_name": "libgraphics-magick-perl",
"binary_version": "1.3.23-1ubuntu0.6"
},
{
"binary_name": "libgraphicsmagick++-q16-12",
"binary_version": "1.3.23-1ubuntu0.6"
},
{
"binary_name": "libgraphicsmagick++1-dev",
"binary_version": "1.3.23-1ubuntu0.6"
},
{
"binary_name": "libgraphicsmagick-q16-3",
"binary_version": "1.3.23-1ubuntu0.6"
},
{
"binary_name": "libgraphicsmagick1-dev",
"binary_version": "1.3.23-1ubuntu0.6"
}
],
"availability": "No subscription required"
}