ImageMagick is vulnerable to arbitrary file read and write. Postscript files could be read and written when specifically excluded by a module
policy in policy.xml
. ex. .
github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/v3.15/community.yaml