I have a version available for testing at: https://people.debian.org/~bam/debian/pool/main/i/imagemagick/
Brian May <b...@debian.org> writes: > CVE-2016-4562 > > The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before > 6.9.4-0 and 7.x before 7.0.1-2 mishandles calculations of certain > vertices integer data, which allows remote attackers to cause a denial > of service (buffer overflow and application crash) or possibly have > unspecified other impact via a crafted file. Not fixed, as I wasn't able to isolate or understand the fix for this. > CVE-2016-4563 > > The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick > before 6.9.4-0 and 7.x before 7.0.1-2 mishandles the relationship > between the BezierQuantum value and certain strokes data, which allows > remote attackers to cause a denial of service (buffer overflow and > application crash) or possibly have unspecified other impact via a > crafted file. Fixed. Possible integer overflow before reallocating memory. > CVE-2016-4564 > > The DrawImage function in MagickCore/draw.c in ImageMagick before > 6.9.4-0 and 7.x before 7.0.1-2 makes an incorrect function call in > attempting to locate the next token, which allows remote attackers to > cause a denial of service (buffer overflow and application crash) or > possibly have unspecified other impact via a crafted file. Not fixed. The wheezy version does not have the extent parameter to the GetMagickToken (which was later renamed to GetNextToken in commit 8bedb4edca01599dfd0612cb0daa35b09c67d736). Possibly this is a security issue not having the extent parameter, however patching this looks like it could be very intrusive - this function is used in a lot of places. The relevant upstream commits I believe are: commit a8b2bb29cfc3909ff5772673d568ac2add6a5083 Author: Cristy <urban-warr...@imagemagick.org> Date: Fri Mar 25 10:39:01 2016 -0400 Check to ensure token does not exceed maximum extent commit fc0f1249300d84ccb63b81a9dd87245d6ed34806 Author: dirk <d...@git.imagemagick.org> Date: Sat Mar 26 00:36:39 2016 +0100 Use correct extent value when calling GetMagickToken. And of course the patch referenced by this CVE: commit 726812fa2fa7ce16bcf58f6e115f65427a1c0950 Author: Cristy <urban-warr...@imagemagick.org> Date: Wed May 4 19:09:35 2016 -0400 Prevent buffer overflow in magick/draw.c -- Brian May <b...@debian.org>