A critical vulnerability was found in ImageMagick which allows remote code to be executed during the conversion of several file formats. There is no proper fix for this other then disabling processing vulnerable commands within image files.
We are preparing imagemagick packages with those policies configured however you may fix it yourself editing few files:
/opt/alt/alt-ImageMagick/etc/ImageMagick-6/policy.xml
/opt/cloudlinux/lib/ImageMagick-6.5.4/config/policy.xml
/etc/ImageMagick/policy.xml
Add the following lines in the section:
...
Then execute:
cagefsctl --force-update
More information:
https://access.redhat.com/security/vulnerabilities/2296071
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-3714