openSUSE Security Update : GraphicsMagick (openSUSE-2017-214)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for GraphicsMagick fixes several issues.

These security issues were fixed :

- CVE-2016-10048: Arbitrary module could have been load
because relative path were not escaped (bsc#1017310)

- CVE-2016-10050: Corrupt RLE files could have overflowed
a heap buffer due to a missing offset check

- CVE-2016-10051: Fixed use after free when reading PWP
files (bsc#1017313)

- CVE-2016-10052: Added bound check to exif parsing of
JPEG files (bsc#1017314)

- CVE-2016-10059: Unchecked calculation when reading TIFF
files could have lead to a buffer overflow (bsc#1017318)

- CVE-2016-10064: Improved checks for buffer overflow when
reading TIFF files (bsc#1017321)

- CVE-2016-10065: Unchecked calculations when reading VIFF
files could have lead to out of bound reads

- CVE-2016-10068: Prevent NULL pointer access when using
the MSL interpreter (bsc#1017324)

- CVE-2016-10069: Add check for invalid mat file

- CVE-2016-10070: Prevent allocating the wrong amount of
memory when reading mat files (bsc#1017326)

- CVE-2016-10146: Captions and labels were handled
incorrectly, causing a memory leak that could have lead
to DoS (bsc#1020443)

- CVE-2017-5511: A missing cast when reading PSD files
could have caused memory corruption by a heap overflow

See also :

Solution :

Update the affected GraphicsMagick packages.

Risk factor :

High / CVSS Base Score : 7.8

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now