Bugzilla (bugzilla.redhat.com) will be under maintenance for infrastructure upgrades and will not be available on July 31st between 12:30 AM - 05:30 AM UTC. We appreciate your understanding and patience. You can follow status.redhat.com for details.
Bug 1410471 (CVE-2016-10061) - CVE-2016-10061 ImageMagick: Write path does not check return of fputc in tiff.c
Summary: CVE-2016-10061 ImageMagick: Write path does not check return of fputc in tiff.c
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2016-10061
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1410515
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-01-05 15:13 UTC by Andrej Nemec
Modified: 2021-02-17 02:49 UTC (History)
12 users (show)

Fixed In Version: ImageMagick 7.0.1
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-01-05 15:14:20 UTC


Attachments (Terms of Use)

Description Andrej Nemec 2017-01-05 15:13:36 UTC
An unchecked return value vulnerability was found in ImageMagick in the tiff.c file. A maliciously crafted file could cause the application to crash.

Upstream bug:

https://github.com/ImageMagick/ImageMagick/issues/196

References:

http://seclists.org/oss-sec/2016/q4/758
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845196

Upstream patch:

https://github.com/ImageMagick/ImageMagick/commit/4e914bbe371433f0590cefdf3bd5f3a5710069f9

Comment 1 Andrej Nemec 2017-01-05 15:14:20 UTC
Statement:

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Comment 2 Andrej Nemec 2017-01-05 16:14:52 UTC
Created ImageMagick tracking bugs for this issue:

Affects: fedora-all [bug 1410515]


Note You need to log in before you can comment on or make changes to this bug.