{"id":"MGASA-2016-0325","summary":"Updated graphicsmagick packages fix security vulnerability","details":"A possible heap overflow of the EscapeParenthesis() function\n(CVE-2016-7447).\n\nThe Utah RLE reader did not validate that header information was\nreasonable given the file size and so it could cause huge memory\nallocations and/or consume huge amounts of CPU (CVE-2016-7448).\n\nThe TIFF reader had a bug pertaining to use of TIFFGetField() when a\n'count' value is returned.  The bug caused a heap read overflow (due to\nusing strlcpy() to copy a possibly unterminated string) which could allow\nan untrusted file to crash the software (CVE-2016-7449).\n","modified":"2026-04-16T06:23:55.456608537Z","published":"2016-09-28T05:59:24Z","upstream":["CVE-2016-7447","CVE-2016-7448","CVE-2016-7449"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0325.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=19302"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2016/09/18/8"}],"affected":[{"package":{"name":"graphicsmagick","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/graphicsmagick?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.25-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0325.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}