漏洞类别:Amazon Linux
漏洞等级:
漏洞信息
A possible heap overflow was discovered in the EscapeParenthesis() function (CVE-2016-7447 ).
Various issues were found in the processing of SVG files in GraphicsMagick (CVE-2016-7446 ).
The TIFF reader had a bug pertaining to use of TIFFGetField() when a 'count' value is returned. The bug caused a heap read overflow (due to using strlcpy() to copy a possibly unterminated string) which could allow an untrusted file to crash the software (CVE-2016-7449 ).
The Utah RLE reader did not validate that header information was reasonable given the file size and so it could cause huge memory allocations and/or consume huge amounts of CPU, causing a denial of service (CVE-2016-7448 )
漏洞危害
Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
解决方案
Please refer to Amazon advisory ALAS-2016-752 for affected packages and patching details, or update with your package manager.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
ALAS-2016-752: Amazon Linux (GraphicsMagick (1.3.25-1.9.amzn1) on noarch)
ALAS-2016-752: Amazon Linux (GraphicsMagick (1.3.25-1.9.amzn1) on x86_64)
ALAS-2016-752: Amazon Linux (GraphicsMagick (1.3.25-1.9.amzn1) on src)
ALAS-2016-752: Amazon Linux (GraphicsMagick (1.3.25-1.9.amzn1) on i686)
0day
文章评论