It was discovered that ImageMagick incorrectly handled certain malformed
image files. If a user or automated system using ImageMagick were tricked
into opening a specially crafted image, an attacker could exploit this to
cause a denial of service or execute code with the privileges of the user
invoking the program.
More Stories
valkey-8.0.1-1.fc40
FEDORA-2024-8a9a692906 Packages in this update: valkey-8.0.1-1.fc40 Update description: update to 8.0.1 fixes (CVE-2024-31449) Lua library commands may lead to stack...
valkey-8.0.1-1.fc41
FEDORA-2024-e717420659 Packages in this update: valkey-8.0.1-1.fc41 Update description: update to 8.0.1 fixes (CVE-2024-31449) Lua library commands may lead to stack...
valkey-8.0.1-1.el9
FEDORA-EPEL-2024-845b92ee3f Packages in this update: valkey-8.0.1-1.el9 Update description: update to 8.0.1 fixes (CVE-2024-31449) Lua library commands may lead to stack...
valkey-8.0.1-1.fc39
FEDORA-2024-83e96146cf Packages in this update: valkey-8.0.1-1.fc39 Update description: update to 8.0.1 fixes (CVE-2024-31449) Lua library commands may lead to stack...
pdns-recursor-5.1.2-1.fc41
FEDORA-2024-aebaa73b1f Packages in this update: pdns-recursor-5.1.2-1.fc41 Update description: Update to latest upstream Read More
pdns-recursor-5.0.9-1.fc40
FEDORA-2024-af0bf62ac6 Packages in this update: pdns-recursor-5.0.9-1.fc40 Update description: Update to latest upstream Read More