Description: | Summary: The remote host is missing an update for the 'gnudl, graphicsmagick, octave, pdf2djvu, photoqt' package(s) announced via the MGASA-2016-0252 advisory.
Vulnerability Insight: - A read out-of-bound in the parsing of gif files using GraphicsMagick (CVE-2015-8808).
- Infinite loop caused by converting a circular defined svg file (CVE-2016-5240).
- Fix another case of CVE-2016-2317 (heap buffer overflow) in the MVG rendering code (also impacts SVG).
- arithmetic exception converting a svg file (CVE-2016-5241)
- Arithmetic exception converting a svg file caused by a X%0 operation in magick/render.c (CVE-2016-2318)
- A shell exploit (CVE-2016-5118) was discovered associated with a filename syntax where file names starting with '' are interpreted as shell commands executed via popen(). Insufficient sanitization in the SVG and MVG renderers allows such filenames to be passed through from potentially untrusted files. There might be other ways for untrusted inputs to produce such filenames. Due to this issue, support for the feature is removed entirely.
The gnudl, octave, pdf2djvu, and photoqt packages have been rebuilt to use the updated GraphicsMagick++ library.
Affected Software/OS: 'gnudl, graphicsmagick, octave, pdf2djvu, photoqt' package(s) on Mageia 5.
Solution: Please install the updated package(s).
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|