Source: graphicsmagick Version: 1.3.26-5 Severity: important Tags: upstream patch security Forwarded: https://sourceforge.net/p/graphicsmagick/bugs/436/
Hi, the following vulnerability was published for graphicsmagick. Remark, I know CVE-2017-13063, CVE-2017-13064, CVE-2017-13065 have the same fixing commit upstream. I though not verfied if common set goes back to oldstable, so decided to fill the isuses individually. If you disagree, please merge those three reports. CVE-2017-13064[0]: | GraphicsMagick 1.3.26 has a heap-based buffer overflow vulnerability in | the function GetStyleTokens in coders/svg.c:311:12. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-13064 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064 [1] https://sourceforge.net/p/graphicsmagick/bugs/436/ Please adjust the affected versions in the BTS as needed. Regards, Salvatore _______________________________________________ Secure-testing-team mailing list Secure-testing-team@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team