First published: Fri Sep 23 2016(Updated: )
Bug report(s): <a href="http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26861">http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26861</a> <a href="https://bugs.debian.org/832944">https://bugs.debian.org/832944</a> Upstream patch(es): <a href="https://github.com/ImageMagick/ImageMagick/commit/3ab016764c7f787829d9065440d86f5609765110">https://github.com/ImageMagick/ImageMagick/commit/3ab016764c7f787829d9065440d86f5609765110</a> <a href="https://github.com/ImageMagick/ImageMagick/commit/9b428b7af688fe319320aed15f2b94281d1e37b4">https://github.com/ImageMagick/ImageMagick/commit/9b428b7af688fe319320aed15f2b94281d1e37b4</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q3/590">http://seclists.org/oss-sec/2016/q3/590</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1378738 is categorized as moderate.
To fix REDHAT-BUG-1378738, update ImageMagick to the latest version that includes the upstream patches.
REDAHT-BUG-1378738 affects multiple versions of ImageMagick; please consult the specific release notes for the versions in question.
As a temporary workaround for REDHAT-BUG-1378738, avoid using the specific functionality that triggers the vulnerability.
Yes, recent updates have addressed REDHAT-BUG-1378738 with appropriate patches.