Source: imagemagick Version: 8:6.9.11.60+dfsg-1.3 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for imagemagick. CVE-2021-39212[0]: | ImageMagick is free software delivered as a ready-to-run binary | distribution or as source code that you may use, copy, modify, and | distribute in both open and proprietary applications. In affected | versions and in certain cases, Postscript files could be read and | written when specifically excluded by a `module` policy in | `policy.xml`. ex. <policy domain="module" rights="none" | pattern="PS" />. The issue has been resolved in ImageMagick 7.1.0-7 | and in 6.9.12-22. Fortunately, in the wild, few users utilize the | `module` policy and instead use the `coder` policy that is also our | workaround recommendation: <policy domain="coder" rights="none" | pattern="{PS,EPI,EPS,EPSF,EPSI}" />. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-39212 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212 [1] https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr Please adjust the affected versions in the BTS as needed. Regards, Salvatore