Name | CVE-2010-4167 |
Description | Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 601824 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
imagemagick (PTS) | bullseye | 8:6.9.11.60+dfsg-1.3+deb11u4 | fixed |
bullseye (security) | 8:6.9.11.60+dfsg-1.3+deb11u5 | fixed | |
bookworm | 8:6.9.11.60+dfsg-1.6+deb12u2 | fixed | |
bookworm (security) | 8:6.9.11.60+dfsg-1.6+deb12u1 | fixed | |
trixie | 8:7.1.1.43+dfsg1-1 | fixed | |
sid | 8:7.1.1.47+dfsg1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
imagemagick | source | lenny | 7:6.3.7.9.dfsg2-1~lenny4 | |||
imagemagick | source | (unstable) | 8:6.6.0.4-3 | low | 601824 |