Source: imagemagick Version: 8:6.9.7.4+dfsg-11 Severity: normal Tags: upstream security Forwarded: https://github.com/ImageMagick/ImageMagick/issues/715
Hi, the following vulnerability was published for imagemagick. CVE-2017-14172[0]: | In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due | to lack of an EOF (End of File) check might cause huge CPU consumption. | When a crafted PSD file, which claims a large "extent" field in the | header but does not contain sufficient backing data, is provided, the | loop over "length" would consume huge CPU resources, since there is no | EOF check inside the loop. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-14172 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14172 [1] https://github.com/ImageMagick/ImageMagick/issues/715 [2] https://github.com/ImageMagick/ImageMagick/commit/8598a497e2d1f556a34458cf54b40ba40674734c Please adjust the affected versions in the BTS as needed. Regards, Salvatore