Back to bug 2214149
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2023-06-12 05:57:47 UTC | CC | bdettelb, drieden, ikanias, jary, jhorak, rravi, tohughes | |
| TEJ RATHI | 2023-06-12 05:58:38 UTC | Depends On | 2214158, 2214159, 2214155 | |
| TEJ RATHI | 2023-06-12 06:14:12 UTC | Blocks | 2211637 | |
| TEJ RATHI | 2023-06-16 11:59:30 UTC | CC | drieden, ikanias, jary, rravi, tohughes | |
| Doc Text | A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service. | |||
| RaTasha Tillery-Smith | 2023-06-16 12:03:48 UTC | Doc Text | A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service. | A heap use-after-free vulnerability was found in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. This flaw allows an attacker to trick a user into opening a specially crafted file to convert, triggering a heap use-after-free write error, and allowing an application to crash, resulting in a denial of service. |
| Red Hat Bugzilla | 2023-07-07 08:31:11 UTC | Assignee | security-response-team | nobody |
Back to bug 2214149