ALT-PU-2018-2652-1
Package GraphicsMagick updated to version 1.3.30-alt1 for branch sisyphus in task 216500.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2019-00424
Уязвимость кроссплатформенной библиотеки для работы с графикой GraphicsMagick, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2019-04037
Уязвимость функции parse8BIM (coders/meta.c) кроссплатформенной библиотеки для работы с графикой GraphicsMagick, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04038
Уязвимость модуля чтения WPG кроссплатформенной библиотеки для работы с графикой GraphicsMagick, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04173
Уязвимость функции QuantumTransferMode (coders/tiff.c) кроссплатформенной библиотеки для работы с графикой GraphicsMagick, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2016-5118
The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename.
- http://git.imagemagick.org/repos/ImageMagick/commit/40639d173aa8c76b850d625c630b711fee4dcfb8
- http://hg.code.sf.net/p/graphicsmagick/code/file/41876934e762/ChangeLog
- http://hg.code.sf.net/p/graphicsmagick/code/rev/ae3928faa858
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00047.html
- http://www.debian.org/security/2016/dsa-3591
- http://www.debian.org/security/2016/dsa-3746
- http://www.openwall.com/lists/oss-security/2016/05/29/7
- http://www.openwall.com/lists/oss-security/2016/05/30/1
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/90938
- http://www.securitytracker.com/id/1035984
- http://www.securitytracker.com/id/1035985
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.397749
- http://www.ubuntu.com/usn/USN-2990-1
- https://access.redhat.com/errata/RHSA-2016:1237
- http://git.imagemagick.org/repos/ImageMagick/commit/40639d173aa8c76b850d625c630b711fee4dcfb8
- http://hg.code.sf.net/p/graphicsmagick/code/file/41876934e762/ChangeLog
- http://hg.code.sf.net/p/graphicsmagick/code/rev/ae3928faa858
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00047.html
- http://www.debian.org/security/2016/dsa-3591
- http://www.debian.org/security/2016/dsa-3746
- http://www.openwall.com/lists/oss-security/2016/05/29/7
- http://www.openwall.com/lists/oss-security/2016/05/30/1
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/90938
- http://www.securitytracker.com/id/1035984
- http://www.securitytracker.com/id/1035985
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.397749
- http://www.ubuntu.com/usn/USN-2990-1
- https://access.redhat.com/errata/RHSA-2016:1237
Modified: 2025-04-20
CVE-2016-5240
The DrawDashPolygon function in magick/render.c in GraphicsMagick before 1.3.24 and the SVG renderer in ImageMagick allow remote attackers to cause a denial of service (infinite loop) by converting a circularly defined SVG file.
- http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=ddc999ec896c
- http://www.debian.org/security/2016/dsa-3746
- http://www.graphicsmagick.org/ChangeLog-2016.html
- http://www.openwall.com/lists/oss-security/2016/05/01/4
- http://www.openwall.com/lists/oss-security/2016/05/01/6
- http://www.openwall.com/lists/oss-security/2016/06/02/14
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/89348
- https://access.redhat.com/errata/RHSA-2016:1237
- http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=ddc999ec896c
- http://www.debian.org/security/2016/dsa-3746
- http://www.graphicsmagick.org/ChangeLog-2016.html
- http://www.openwall.com/lists/oss-security/2016/05/01/4
- http://www.openwall.com/lists/oss-security/2016/05/01/6
- http://www.openwall.com/lists/oss-security/2016/06/02/14
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/89348
- https://access.redhat.com/errata/RHSA-2016:1237
Modified: 2025-04-20
CVE-2016-5241
magick/render.c in GraphicsMagick before 1.3.24 allows remote attackers to cause a denial of service (arithmetic exception and application crash) via a crafted svg file.
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html
- http://www.graphicsmagick.org/NEWS.html#may-30-2016
- http://www.openwall.com/lists/oss-security/2016/05/01/6
- http://www.openwall.com/lists/oss-security/2016/06/02/14
- http://www.securityfocus.com/bid/89348
- https://bugzilla.redhat.com/show_bug.cgi?id=1333410
- https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html
- http://www.graphicsmagick.org/NEWS.html#may-30-2016
- http://www.openwall.com/lists/oss-security/2016/05/01/6
- http://www.openwall.com/lists/oss-security/2016/06/02/14
- http://www.securityfocus.com/bid/89348
- https://bugzilla.redhat.com/show_bug.cgi?id=1333410
- https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
Modified: 2025-04-20
CVE-2016-7447
Heap-based buffer overflow in the EscapeParenthesis function in GraphicsMagick before 1.3.25 allows remote attackers to have unspecified impact via unknown vectors.
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html
- http://www.openwall.com/lists/oss-security/2016/09/18/8
- http://www.securityfocus.com/bid/93074
- https://bugzilla.redhat.com/show_bug.cgi?id=1374233
- https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html
- http://www.openwall.com/lists/oss-security/2016/09/18/8
- http://www.securityfocus.com/bid/93074
- https://bugzilla.redhat.com/show_bug.cgi?id=1374233
- https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
Modified: 2025-04-20
CVE-2016-7448
The Utah RLE reader in GraphicsMagick before 1.3.25 allows remote attackers to cause a denial of service (CPU consumption or large memory allocations) via vectors involving the header information and the file size.
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html
- http://www.openwall.com/lists/oss-security/2016/09/18/8
- http://www.securityfocus.com/bid/93074
- https://bugzilla.redhat.com/show_bug.cgi?id=1374233
- https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html
- http://www.openwall.com/lists/oss-security/2016/09/18/8
- http://www.securityfocus.com/bid/93074
- https://bugzilla.redhat.com/show_bug.cgi?id=1374233
- https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
Modified: 2025-04-20
CVE-2016-7800
Integer underflow in the parse8BIM function in coders/meta.c in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (application crash) via a crafted 8BIM chunk, which triggers a heap-based buffer overflow.
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html
- http://www.debian.org/security/2016/dsa-3746
- http://www.openwall.com/lists/oss-security/2016/10/01/7
- http://www.securityfocus.com/bid/93262
- http://www.securityfocus.com/bid/96135
- https://bugzilla.redhat.com/show_bug.cgi?id=1381148
- https://sourceforge.net/p/graphicsmagick/code/ci/5c7b6d6094a25e99c57f8b18343914ebfd8213ef/
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html
- http://www.debian.org/security/2016/dsa-3746
- http://www.openwall.com/lists/oss-security/2016/10/01/7
- http://www.securityfocus.com/bid/93262
- http://www.securityfocus.com/bid/96135
- https://bugzilla.redhat.com/show_bug.cgi?id=1381148
- https://sourceforge.net/p/graphicsmagick/code/ci/5c7b6d6094a25e99c57f8b18343914ebfd8213ef/
Modified: 2025-04-20
CVE-2016-7996
Heap-based buffer overflow in the WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to have unspecified impact via a colormap with a large number of entries.
- http://www.debian.org/security/2016/dsa-3746
- http://www.openwall.com/lists/oss-security/2016/10/07/4
- http://www.openwall.com/lists/oss-security/2016/10/08/5
- http://www.securityfocus.com/bid/93464
- http://www.debian.org/security/2016/dsa-3746
- http://www.openwall.com/lists/oss-security/2016/10/07/4
- http://www.openwall.com/lists/oss-security/2016/10/08/5
- http://www.securityfocus.com/bid/93464
Modified: 2025-04-20
CVE-2016-7997
The WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (assertion failure and crash) via vectors related to a ReferenceBlob and a NULL pointer.
- http://www.debian.org/security/2016/dsa-3746
- http://www.openwall.com/lists/oss-security/2016/10/07/4
- http://www.openwall.com/lists/oss-security/2016/10/08/5
- http://www.securityfocus.com/bid/93467
- http://www.debian.org/security/2016/dsa-3746
- http://www.openwall.com/lists/oss-security/2016/10/07/4
- http://www.openwall.com/lists/oss-security/2016/10/08/5
- http://www.securityfocus.com/bid/93467
Modified: 2025-04-20
CVE-2017-6335
The QuantumTransferMode function in coders/tiff.c in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a small samples per pixel value in a CMYKA TIFF file.
- http://www.openwall.com/lists/oss-security/2017/02/28/2
- http://www.securityfocus.com/bid/96544
- https://bugzilla.redhat.com/show_bug.cgi?id=1427975
- https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
- https://sourceforge.net/p/graphicsmagick/code/ci/6156b4c2992d855ece6079653b3b93c3229fc4b8/
- https://usn.ubuntu.com/4206-1/
- http://www.openwall.com/lists/oss-security/2017/02/28/2
- http://www.securityfocus.com/bid/96544
- https://bugzilla.redhat.com/show_bug.cgi?id=1427975
- https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
- https://sourceforge.net/p/graphicsmagick/code/ci/6156b4c2992d855ece6079653b3b93c3229fc4b8/
- https://usn.ubuntu.com/4206-1/
Modified: 2025-04-20
CVE-2017-9098
ImageMagick before 7.0.5-2 and GraphicsMagick before 1.3.24 use uninitialized memory in the RLE decoder, allowing an attacker to leak sensitive information from process memory space, as demonstrated by remote attacks against ImageMagick code in a long-running server process that converts image data on behalf of multiple users. This is caused by a missing initialization step in the ReadRLEImage function in coders/rle.c.
- http://hg.code.sf.net/p/graphicsmagick/code/diff/0a5b75e019b6/coders/rle.c
- http://www.debian.org/security/2017/dsa-3863
- http://www.securityfocus.com/bid/98593
- https://github.com/ImageMagick/ImageMagick/commit/1c358ffe0049f768dd49a8a889c1cbf99ac9849b
- https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
- https://scarybeastsecurity.blogspot.com/2017/05/bleed-continues-18-byte-file-14k-bounty.html
- http://hg.code.sf.net/p/graphicsmagick/code/diff/0a5b75e019b6/coders/rle.c
- http://www.debian.org/security/2017/dsa-3863
- http://www.securityfocus.com/bid/98593
- https://github.com/ImageMagick/ImageMagick/commit/1c358ffe0049f768dd49a8a889c1cbf99ac9849b
- https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
- https://scarybeastsecurity.blogspot.com/2017/05/bleed-continues-18-byte-file-14k-bounty.html
Modified: 2024-11-21
CVE-2018-6799
The AcquireCacheNexus function in magick/pixel_cache.c in GraphicsMagick before 1.3.28 allows remote attackers to cause a denial of service (heap overwrite) or possibly have unspecified other impact via a crafted image file, because a pixel staging area is not used.
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/b41e2efce6d3
- http://www.securityfocus.com/bid/102981
- https://lists.debian.org/debian-lts-announce/2018/02/msg00017.html
- https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
- https://www.debian.org/security/2018/dsa-4321
- http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/b41e2efce6d3
- http://www.securityfocus.com/bid/102981
- https://lists.debian.org/debian-lts-announce/2018/02/msg00017.html
- https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
- https://www.debian.org/security/2018/dsa-4321