First published: Thu Jan 05 2017(Updated: )
A use-after-free vulnerability was found in ImageMagick. A maliciously crafted file could cause the application to crash or possibly have other impact. Upstream bug: <a href="https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=30245">https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=30245</a> References: <a href="http://seclists.org/oss-sec/2016/q4/758">http://seclists.org/oss-sec/2016/q4/758</a> Upstream patch: <a href="https://github.com/ImageMagick/ImageMagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521">https://github.com/ImageMagick/ImageMagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ImageMagick | <6.9.5 | 6.9.5 |
ImageMagick ImageMagick | =6.9.5-5 | |
openSUSE Leap | =42.1 | |
openSUSE Leap | =42.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.