aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBrian May <brian@linuxpenguins.xyz>2019-04-15 17:04:14 +1000
committerBrian May <brian@linuxpenguins.xyz>2019-04-15 17:08:21 +1000
commit72f9357c5679b1e36a67da1a7afcf729e69b36c2 (patch)
tree409c92859b973a89aa9e4e6565438e3cce1ad892
parent582c442a0c7a754eeaf62ab77fadabb963e9c1a2 (diff)
DLA-1130-1 advisory
-rw-r--r--english/lts/security/2017/dla-1130.data8
-rw-r--r--english/lts/security/2017/dla-1130.wml44
2 files changed, 48 insertions, 4 deletions
diff --git a/english/lts/security/2017/dla-1130.data b/english/lts/security/2017/dla-1130.data
index d9c083a3ce7..944c0ccae96 100644
--- a/english/lts/security/2017/dla-1130.data
+++ b/english/lts/security/2017/dla-1130.data
@@ -1,6 +1,10 @@
-<define-tag pagetitle>DLA-1130-1 (unused)</define-tag>
+<define-tag pagetitle>DLA-1130-1 graphicsmagick</define-tag>
<define-tag report_date>2017-10-19</define-tag>
-<define-tag packages> </define-tag>
+<define-tag secrefs>CVE-2017-14103 CVE-2017-14314 CVE-2017-14504 CVE-2017-14733 CVE-2017-14994 CVE-2017-14997</define-tag>
+<define-tag packages>graphicsmagick</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
#use wml::debian::security
diff --git a/english/lts/security/2017/dla-1130.wml b/english/lts/security/2017/dla-1130.wml
index 77847c5d366..6db04d3dddf 100644
--- a/english/lts/security/2017/dla-1130.wml
+++ b/english/lts/security/2017/dla-1130.wml
@@ -1,8 +1,48 @@
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
-<p>DLA-1130 was allocated but never used.
-</p>
+<p>This upload fixes a number of security issues in graphicsmagick.</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14103">CVE-2017-14103</a>
+
+ <p>The ReadJNGImage and ReadOneJNGImage functions in
+ coders/png.c did not properly manage image pointers after certain error
+ conditions.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14314">CVE-2017-14314</a>
+
+ <p>Heap-based buffer over-read in DrawDashPolygon() .</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14504">CVE-2017-14504</a>
+
+ <p>NULL pointer dereference triggered by malformed file.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14733">CVE-2017-14733</a>
+
+ <p>Ensure we detect alpha images with too few colors.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14994">CVE-2017-14994</a>
+
+ <p>DCM_ReadNonNativeImages() can produce image list with
+ no frames, resulting in null image pointer.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14997">CVE-2017-14997</a>
+
+ <p>Unsigned underflow leading to astonishingly
+ large allocation request.</p></li>
+
+</ul>
+
+<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
+1.3.16-1.1+deb7u10.</p>
+
+<p>We recommend that you upgrade your graphicsmagick packages.</p>
+
+<p>Further information about Debian LTS security advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</define-tag>
# do not modify the following line

© 2014-2024 Faster IT GmbH | imprint | privacy policy