Source: imagemagick Version: 8:6.9.7.4+dfsg-11 Severity: normal Tags: upstream security Forwarded: https://github.com/ImageMagick/ImageMagick/issues/712
Hi, the following vulnerability was published for imagemagick. CVE-2017-14175[0]: | In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due | to lack of an EOF (End of File) check might cause huge CPU consumption. | When a crafted XBM file, which claims large rows and columns fields in | the header but does not contain sufficient backing data, is provided, | the loop over the rows would consume huge CPU resources, since there is | no EOF check inside the loop. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-14175 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14175 [1] https://github.com/ImageMagick/ImageMagick/issues/712 [2] https://github.com/ImageMagick/ImageMagick/commit/b8c63b156bf26b52e710b1a0643c846a6cd01e56 Please adjust the affected versions in the BTS as needed. Regards, Salvatore _______________________________________________ Secure-testing-team mailing list Secure-testing-team@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team