MGASA-2014-0484

Source
https://advisories.mageia.org/MGASA-2014-0484.html
Import Source
https://advisories.mageia.org/MGASA-2014-0484.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0484
Related
Published
2014-11-25T09:21:26Z
Modified
2014-11-25T09:06:10Z
Summary
Updated graphicsmagick packages fix security vulnerability
Details

GraphicsMagick is vulnerable to an out of bounds read / heap Overflow in the function ReadPCXImage in the file pcx.c. This can be exploited by a crafted image file to cause a denial of service (CVE-2014-8355).

References
Credits

Affected packages

Mageia:3 / graphicsmagick

Package

Name
graphicsmagick
Purl
pkg:rpm/mageia/graphicsmagick?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.17-2.4.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / graphicsmagick

Package

Name
graphicsmagick
Purl
pkg:rpm/mageia/graphicsmagick?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.18-3.3.mga4

Ecosystem specific

{
    "section": "core"
}