First published: Tue Jun 07 2016(Updated: )
Fixed a memory leak in psd handling. CVE assignment: <a href="http://seclists.org/oss-sec/2016/q2/459">http://seclists.org/oss-sec/2016/q2/459</a> Upstream patch: <a href="https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=f9ef11671c41da4cf973d0d880af1cdfbd127860">https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=f9ef11671c41da4cf973d0d880af1cdfbd127860</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =13.2 | |
openSUSE Leap | =42.1 | |
SUSE Linux Enterprise Debuginfo | =11.0-sp4 | |
SUSE Linux Enterprise Desktop | =12.0-sp1 | |
SUSE Linux Enterprise Server | =11.0-sp4 | |
SUSE Linux Enterprise Server | =12.0-sp1 | |
SUSE Linux Enterprise Software Development Kit | =11.0-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12.0-sp1 | |
SUSE Linux Enterprise Workstation Extension | =12.0-sp1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =16.10 | |
ImageMagick ImageMagick | =6.8.8-9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9842 affects various versions of ImageMagick and several distributions such as openSUSE and Ubuntu.
The severity of CVE-2014-9842 is considered to reflect a memory leak vulnerability in handling PSD files.
To fix CVE-2014-9842, users should update their ImageMagick installation to the latest version that includes the relevant security patch.
CVE-2014-9842 may be exploitable remotely if the vulnerable version of ImageMagick is used in a web application processing user-uploaded PSD files.
CVE-2014-9842 was publicly disclosed on March 12, 2016, in a security announcement on the oss-sec mailing list.