Back to bug 1973689
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2021-06-18 13:45:41 UTC | Depends On | 1973692, 1973691 | |
| Guilherme de Almeida Suckevicz | 2021-06-18 13:46:16 UTC | Blocks | 1973694 | |
| Guilherme de Almeida Suckevicz | 2021-06-18 13:47:44 UTC | Blocks | 1967292 | |
| Todd Cullum | 2021-06-21 21:54:01 UTC | Fixed In Version | ImageMagick 7.0.11-14 | |
| Product Security DevOps Team | 2021-06-21 22:40:25 UTC | Status | NEW | CLOSED |
| Resolution | --- | NOTABUG | ||
| Last Closed | 2021-06-21 22:40:25 UTC | |||
| Guilherme de Almeida Suckevicz | 2022-02-15 18:00:23 UTC | Doc Text | A heap-based buffer overflow vulnerability was found in ImageMagick in ReadTIFFImage() in coders/tiff.c because of an incorrect setting of the pixel array size which can lead to crash and segmentation fault. This flaw affects ImageMagick versions prior to 7.1.0-0 and 7.0.11-14. | |
| RaTasha Tillery-Smith | 2022-02-15 18:59:49 UTC | Doc Text | A heap-based buffer overflow vulnerability was found in ImageMagick in ReadTIFFImage() in coders/tiff.c because of an incorrect setting of the pixel array size which can lead to crash and segmentation fault. This flaw affects ImageMagick versions prior to 7.1.0-0 and 7.0.11-14. | A heap-based buffer overflow vulnerability was found in ImageMagick in ReadTIFFImage() in coders/tiff.c. This issue is due to an incorrect setting of the pixel array size, which can lead to a crash and segmentation fault. |
Back to bug 1973689