[Secure-testing-team] Bug#873129: graphicsmagick: CVE-2017-13064
Salvatore Bonaccorso
carnil at debian.org
Thu Aug 24 18:47:12 UTC 2017
Source: graphicsmagick
Version: 1.3.26-5
Severity: important
Tags: upstream patch security
Forwarded: https://sourceforge.net/p/graphicsmagick/bugs/436/
Hi,
the following vulnerability was published for graphicsmagick.
Remark, I know CVE-2017-13063, CVE-2017-13064, CVE-2017-13065 have the
same fixing commit upstream. I though not verfied if common set goes
back to oldstable, so decided to fill the isuses individually. If you
disagree, please merge those three reports.
CVE-2017-13064[0]:
| GraphicsMagick 1.3.26 has a heap-based buffer overflow vulnerability in
| the function GetStyleTokens in coders/svg.c:311:12.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-13064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064
[1] https://sourceforge.net/p/graphicsmagick/bugs/436/
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
More information about the Secure-testing-team
mailing list