First published: Fri Sep 23 2016(Updated: )
Bug report(s): <a href="https://github.com/ImageMagick/ImageMagick/issues/109">https://github.com/ImageMagick/ImageMagick/issues/109</a> <a href="https://bugs.launchpad.net/bugs/1539066">https://bugs.launchpad.net/bugs/1539066</a> Upstream patch(es): <a href="https://github.com/ImageMagick/ImageMagick/commit/4f2c04ea6673863b87ac7f186cbb0d911f74085c">https://github.com/ImageMagick/ImageMagick/commit/4f2c04ea6673863b87ac7f186cbb0d911f74085c</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q3/590">http://seclists.org/oss-sec/2016/q3/590</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1378764 is categorized as a moderate vulnerability that can lead to potential denial of service.
To fix REDHAT-BUG-1378764, apply the latest patches provided by the ImageMagick maintainers.
REDHAT-BUG-1378764 affects various versions of ImageMagick prior to the latest upstream patch.
You can determine if your system is vulnerable to REDHAT-BUG-1378764 by checking the installed version of ImageMagick against the patched versions available.
Not addressing REDHAT-BUG-1378764 may result in service interruptions or crashes when processing specific image files.