Back to bug 2185714
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2023-04-11 04:39:17 UTC | Depends On | 2185716, 2185715 | |
| TEJ RATHI | 2023-04-11 04:39:47 UTC | Blocks | 2185712 | |
| TEJ RATHI | 2023-04-11 04:41:09 UTC | CC | bdettelb, drieden, ikanias, jary, jhorak, rravi, tohughes | |
| Product Security DevOps Team | 2023-04-11 21:05:08 UTC | Resolution | --- | WONTFIX |
| Status | NEW | CLOSED | ||
| Last Closed | 2023-04-11 21:05:08 UTC | |||
| TEJ RATHI | 2023-04-12 13:59:40 UTC | Doc Text | A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service. | |
| Paige Jung | 2023-04-12 18:00:30 UTC | Doc Text | A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service. | A heap-based buffer overflow was found in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. This issue could allow an attacker to pass a specially crafted file to convert, triggering an out-of-bounds read error, which could cause an application to crash and result in a denial of service. |
| Jon | 2023-07-10 13:32:46 UTC | CC | powerdirectormodapk | |
| JoseSilas | 2023-07-31 10:53:46 UTC | CC | grahamlogan429 | |
| Jonathan Wakely | 2023-08-10 15:45:45 UTC | CC | ashleydurack041 | |
| Comment 6 Tag | spam | |||
| Jonathan Wakely | 2023-08-10 15:45:47 UTC | Comment 5 Tag | spam | |
| Jonathan Wakely | 2023-08-10 15:45:49 UTC | Comment 4 Tag | spam |
Back to bug 2185714