logo
DATABASE RESOURCES PRICING ABOUT US

graphicsmagick - security update

Description

Various security issues were found and fixed in graphicsmagick in Debian wheezy LTS. * [CVE-2016-7446](https://security-tracker.debian.org/tracker/CVE-2016-7446) Heap buffer overflow issue in MVG/SVG rendering. * [CVE-2016-7447](https://security-tracker.debian.org/tracker/CVE-2016-7447) Heap overflow of the EscapeParenthesis() function * [CVE-2016-7449](https://security-tracker.debian.org/tracker/CVE-2016-7449) TIFF related problems due to use of strlcpy use. * [CVE-2016-7800](https://security-tracker.debian.org/tracker/CVE-2016-7800) Fix unsigned underflow leading to heap overflow when parsing 8BIM chunk. For Debian 7 Wheezy, these problems have been fixed in version 1.3.16-1.1+deb7u4. We recommend that you upgrade your graphicsmagick packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: <https://wiki.debian.org/LTS>


Affected Software


CPE Name Name Version
graphicsmagick 1.3.16-1.1+deb7u1
graphicsmagick 1.3.16-1.1
graphicsmagick 1.3.16-1.1+deb7u3
graphicsmagick 1.3.16-1.1+deb7u2

Related