diff options
author | Brian May <brian@linuxpenguins.xyz> | 2019-04-15 17:04:14 +1000 |
---|---|---|
committer | Brian May <brian@linuxpenguins.xyz> | 2019-04-15 17:08:21 +1000 |
commit | 72f9357c5679b1e36a67da1a7afcf729e69b36c2 (patch) | |
tree | 409c92859b973a89aa9e4e6565438e3cce1ad892 | |
parent | 582c442a0c7a754eeaf62ab77fadabb963e9c1a2 (diff) |
DLA-1130-1 advisory
-rw-r--r-- | english/lts/security/2017/dla-1130.data | 8 | ||||
-rw-r--r-- | english/lts/security/2017/dla-1130.wml | 44 |
2 files changed, 48 insertions, 4 deletions
diff --git a/english/lts/security/2017/dla-1130.data b/english/lts/security/2017/dla-1130.data index d9c083a3ce7..944c0ccae96 100644 --- a/english/lts/security/2017/dla-1130.data +++ b/english/lts/security/2017/dla-1130.data @@ -1,6 +1,10 @@ -<define-tag pagetitle>DLA-1130-1 (unused)</define-tag> +<define-tag pagetitle>DLA-1130-1 graphicsmagick</define-tag> <define-tag report_date>2017-10-19</define-tag> -<define-tag packages> </define-tag> +<define-tag secrefs>CVE-2017-14103 CVE-2017-14314 CVE-2017-14504 CVE-2017-14733 CVE-2017-14994 CVE-2017-14997</define-tag> +<define-tag packages>graphicsmagick</define-tag> +<define-tag isvulnerable>yes</define-tag> +<define-tag fixed>yes</define-tag> +<define-tag fixed-section>no</define-tag> #use wml::debian::security diff --git a/english/lts/security/2017/dla-1130.wml b/english/lts/security/2017/dla-1130.wml index 77847c5d366..6db04d3dddf 100644 --- a/english/lts/security/2017/dla-1130.wml +++ b/english/lts/security/2017/dla-1130.wml @@ -1,8 +1,48 @@ <define-tag description>LTS security update</define-tag> <define-tag moreinfo> -<p>DLA-1130 was allocated but never used. -</p> +<p>This upload fixes a number of security issues in graphicsmagick.</p> + +<ul> + +<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14103">CVE-2017-14103</a> + + <p>The ReadJNGImage and ReadOneJNGImage functions in + coders/png.c did not properly manage image pointers after certain error + conditions.</p></li> + +<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14314">CVE-2017-14314</a> + + <p>Heap-based buffer over-read in DrawDashPolygon() .</p></li> + +<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14504">CVE-2017-14504</a> + + <p>NULL pointer dereference triggered by malformed file.</p></li> + +<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14733">CVE-2017-14733</a> + + <p>Ensure we detect alpha images with too few colors.</p></li> + +<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14994">CVE-2017-14994</a> + + <p>DCM_ReadNonNativeImages() can produce image list with + no frames, resulting in null image pointer.</p></li> + +<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14997">CVE-2017-14997</a> + + <p>Unsigned underflow leading to astonishingly + large allocation request.</p></li> + +</ul> + +<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version +1.3.16-1.1+deb7u10.</p> + +<p>We recommend that you upgrade your graphicsmagick packages.</p> + +<p>Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p> </define-tag> # do not modify the following line |