Title
MGASA-2016-0252 -- security update for graphicsmagick, gnudl, octave, pdf2djvu, photoqt
Description
- A read out-of-bound in the parsing of gif files using GraphicsMagick
(CVE-2015-8808).
- Infinite loop caused by converting a circularly defined svg file
(CVE-2016-5240).
- Fix another case of CVE-2016-2317 (heap buffer overflow) in the MVG
rendering code (also impacts SVG).
- arithmetic exception converting a svg file (CVE-2016-5241)
- Arithmetic exception converting a svg file caused by a X%0 operation in
magick/render.c (CVE-2016-2318)
- A shell exploit (CVE-2016-5118) was discovered associated with a
filename syntax where file names starting with '|' are intepreted as
shell commands executed via popen(). Insufficient sanitization in the
SVG and MVG renderers allows such filenames to be passed through from
potentially untrusted files. There might be other ways for untrusted
inputs to produce such filenames. Due to this issue, support for the
feature is removed entirely.
The gnudl, octave, pdf2djvu, and photoqt packages have been rebuilt to use
the updated GraphicsMagick++ library.