-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Package: imagemagick Version: 8:6.8.9.9-7.2 Severity: important Tags: security, upstream, fixed-upstream
A buffer overflow vulnerability has been fixed by following commit: https://github.com/ImageMagick/ImageMagick/commit/76401e172ea3a55182be2b8e2aca4d07270f6da6 Related CVE request: http://www.openwall.com/lists/oss-security/2016/08/02/6 - -- Henri Salo -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJXo/eaAAoJECet96ROqnV0u9QQANLAzG9TZtzzJ5PLCtr4ZeGZ 4HgWCG/QyZ050w3ytvmffRprsZIW05WrsAq9bOHqWE5pZEC9jBWNWs4bIlQtnD5n mw7onqbNQLVX/MToBFvCKz9/Ng9YjSvseRG9dAsNgZGSghg/OL6MF53fu14V4lOv J2zMGy7fLsgwSBQKNjpQAqKAfigZq+XSYFQ9UtV+kuiNk7Wjh+vJXn4GO/T1v5EM LhLdoZCb9ebmtvkfqlEFAESbCe1QTGeT09gRjbJ43aynAIz+gvt/mM4JUfiBpiDx ///+P056oOLTAPNmCSMcapdX2A5DedOJDh8e6zrurJmbAEnbvIUGvcPKmdFS34au y9w4RF2NGNFJNf9zJ/vNLbsbjsXQQEE6qZ8bBxdZ9u9lNwbaI6lLtriOOLdlWfX+ a5Swe9Yt+sw0hY9TTmGxpyEfpXnzvggOWOs/4879g/+LjWc5waJlU+sSygi+JYHF srtK3U8gLr9jlG7nGa6zMG7euRmuc+ipoYcyjYEb89TOrBQq4U6MqhCpQutVsDq4 78KY9UEHfF8MSNWiWJUgKcQws2tGKFmJz3WhRqE4D6TXajKD0IfaFQ4oJwuhA9ty G8HuMT38mtIBjpVSv+jYT312XfZ0bWRmzuKWIGiTxl1tygTdV5OgPkkJWL0K+4dA f/jwBBIC7FnUx3vQ20S9 =VOoc -----END PGP SIGNATURE-----