[Secure-testing-team] Bug#873129: graphicsmagick: CVE-2017-13064

Salvatore Bonaccorso carnil at debian.org
Thu Aug 24 18:47:12 UTC 2017


Source: graphicsmagick
Version: 1.3.26-5
Severity: important
Tags: upstream patch security
Forwarded: https://sourceforge.net/p/graphicsmagick/bugs/436/

Hi,

the following vulnerability was published for graphicsmagick.

Remark, I know CVE-2017-13063, CVE-2017-13064, CVE-2017-13065 have the
same fixing commit upstream. I though not verfied if common set goes
back to oldstable, so decided to fill the isuses individually. If you
disagree, please merge those three reports.

CVE-2017-13064[0]:
| GraphicsMagick 1.3.26 has a heap-based buffer overflow vulnerability in
| the function GetStyleTokens in coders/svg.c:311:12.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-13064
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
[1] https://sourceforge.net/p/graphicsmagick/bugs/436/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the Secure-testing-team mailing list