ALT-BU-2020-3674-13
Branch p9 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-1010142
scapy 2.4.0 is affected by: Denial of Service. The impact is: infinite loop, resource consumption and program unresponsive. The component is: _RADIUSAttrPacketListField.getfield(self..). The attack vector is: over the network or in a pcap. both work.
- 106674
- 106674
- https://github.com/secdev/scapy/pull/1409
- https://github.com/secdev/scapy/pull/1409
- https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058
- https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058
- FEDORA-2019-d49c8ec32b
- FEDORA-2019-d49c8ec32b
- FEDORA-2019-47946eb312
- FEDORA-2019-47946eb312
- https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/
- https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/
Closed vulnerabilities
BDU:2021-00097
Уязвимость интерпретатора языка программирования PHP, связанная с неправильным сохранением разрешений, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-00098
Уязвимость интерпретатора языка программирования PHP, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-7061
In PHP versions 7.3.x below 7.3.15 and 7.4.x below 7.4.3, while extracting PHAR files on Windows using phar extension, certain content inside PHAR file could lead to one-byte read past the allocated buffer. This could potentially lead to information disclosure or crash.
Modified: 2024-11-21
CVE-2020-7062
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79221
- https://bugs.php.net/bug.php?id=79221
- [debian-lts-announce] 20200326 [SECURITY] [DLA 2160-1] php5 security update
- [debian-lts-announce] 20200326 [SECURITY] [DLA 2160-1] php5 security update
- GLSA-202003-57
- GLSA-202003-57
- USN-4330-1
- USN-4330-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7063
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on the filesystem were with more restrictive permissions. This may result in files having more lax permissions than intended when such archive is extracted.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79082
- https://bugs.php.net/bug.php?id=79082
- [debian-lts-announce] 20200326 [SECURITY] [DLA 2160-1] php5 security update
- [debian-lts-announce] 20200326 [SECURITY] [DLA 2160-1] php5 security update
- GLSA-202003-57
- GLSA-202003-57
- USN-4330-1
- USN-4330-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Package kernel-image-un-def updated to version 5.4.22-alt1 for branch p9 in task 246888.
Closed vulnerabilities
BDU:2015-05303
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05304
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05305
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05306
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05307
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05308
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05309
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05310
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05311
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05312
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05313
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05314
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05315
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05542
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05543
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-00158
Уязвимость функции nfp_abm_u32_knode_replace() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00851
Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2013-1798
The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55
- openSUSE-SU-2013:0847
- openSUSE-SU-2013:0847
- openSUSE-SU-2013:0925
- openSUSE-SU-2013:0925
- openSUSE-SU-2013:1187
- openSUSE-SU-2013:1187
- http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
- http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
- RHSA-2013:0727
- RHSA-2013:0727
- RHSA-2013:0744
- RHSA-2013:0744
- RHSA-2013:0746
- RHSA-2013:0746
- RHSA-2013:0928
- RHSA-2013:0928
- RHSA-2013:1026
- RHSA-2013:1026
- MDVSA-2013:176
- MDVSA-2013:176
- [oss-security] 20130320 linux kernel: kvm: CVE-2013-179[6..8]
- [oss-security] 20130320 linux kernel: kvm: CVE-2013-179[6..8]
- USN-1809-1
- USN-1809-1
- USN-1812-1
- USN-1812-1
- USN-1813-1
- USN-1813-1
- https://bugzilla.redhat.com/show_bug.cgi?id=917017
- https://bugzilla.redhat.com/show_bug.cgi?id=917017
- https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55
- https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55
Modified: 2024-11-21
CVE-2019-19076
A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 was reverted
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6
- https://git.kernel.org/linus/1d1997db870f4058676439ef7014390ba9e24eb2
- https://git.kernel.org/linus/1d1997db870f4058676439ef7014390ba9e24eb2
- https://github.com/torvalds/linux/commit/78beef629fd95be4ed853b2d37b832f766bd96ca
- https://github.com/torvalds/linux/commit/78beef629fd95be4ed853b2d37b832f766bd96ca
- https://lore.kernel.org/lkml/20191204103955.63c4d9af%40cakuba.netronome.com/
- https://lore.kernel.org/lkml/20191204103955.63c4d9af%40cakuba.netronome.com/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4209-1
- USN-4209-1
Modified: 2024-11-21
CVE-2019-3016
In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.
- http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
- http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
- [oss-security] 20200130 CVE-2019-3016: information leak within a KVM guest
- [oss-security] 20200130 CVE-2019-3016: information leak within a KVM guest
- https://bugzilla.redhat.com/show_bug.cgi?id=1792167
- https://bugzilla.redhat.com/show_bug.cgi?id=1792167
- https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7
- https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7
- https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e
- https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e
- https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589
- https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589
- https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e
- https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e
- https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796
- https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796
- https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini%40redhat.com/
- https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini%40redhat.com/
- https://security.netapp.com/advisory/ntap-20200313-0003/
- https://security.netapp.com/advisory/ntap-20200313-0003/
- USN-4300-1
- USN-4300-1
- USN-4301-1
- USN-4301-1
- DSA-4699
- DSA-4699
Closed bugs
Перенести lsof в /usr/bin/
Closed vulnerabilities
BDU:2022-01738
Уязвимость функции Fraction компонента libheif/box.cc библиотеки кодирования и декодирования файлов HEIF и AVIF Libheif, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-02069
Уязвимость функции heif::Box_iref::get_references библиотеки кодирования и декодирования файлов HEIF и AVIF Libheif, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11471
libheif 1.4.0 has a use-after-free in heif::HeifContext::Image::set_alpha_channel in heif_context.h because heif_context.cc mishandles references to non-existing alpha images.
Modified: 2024-11-21
CVE-2020-19498
Floating point exception in function Fraction in libheif 1.4.0, allows attackers to cause a Denial of Service or possibly other unspecified impacts.
Modified: 2024-11-21
CVE-2020-19499
An issue was discovered in heif::Box_iref::get_references in libheif 1.4.0, allows attackers to cause a Denial of Service or possibly other unspecified impact due to an invalid memory read.
Package ImageMagick updated to version 6.9.10.94-alt1 for branch p9 in task 244301.
Closed vulnerabilities
BDU:2020-01864
Уязвимость функции ReadCUTImage консольного графического редактора ImageMagick, связанная с использованием неинициализированного ресурса, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-01010
Уязвимость функций в файлах MagickCore/colorspace-private.h и MagickCore/quantum.h консольного графического редактора ImageMagick, свзанная с ошибками деления на ноль, позволяющая нарушителю вызвать состояние отказа в обслуживании
BDU:2021-01016
Уязвимость функции IntensityCompare() консольного графического редактора ImageMagick, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01035
Уязвимость функции SetImageExtent() консольного графического редактора ImageMagick, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01036
Уязвимость консольного графического редактора ImageMagick, связанная с ошибками освобождения памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01037
Уязвимость функции консольного графического редактора ImageMagick, связанная с целочисленным переполнением, позволяющая нарушителю вызвать состояние отказа в обслуживании
BDU:2021-03381
Уязвимость функции SubstituteString() компонента MagickCore/string.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03404
Уязвимость компонента MagickCore/quantum.h консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03405
Уязвимость компонента MagickCore/quantum.h консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03406
Уязвимость компонента coders/bmp.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03407
Уязвимость функции RestoreMSCWarning() компонента /coders/pdf.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03410
Уязвимость компонента MagickCore/statistic.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-03411
Уязвимость функции HistogramCompare() компонента MagickCore/histogram.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03414
Уязвимость функции WriteOnePNGImage() компонента coders/png.c консольного графического редактора ImageMagick, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03415
Уязвимость процедур CropImage() и CropImageToTiles() компонента MagickCore/transform.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03416
Уязвимость функций CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), InterpolatePixelInfo() компонента /MagickCore/pixel.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03417
Уязвимость функции ScaleAnyToQuantum() компонента /MagickCore/quantum-private.h консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03418
Уязвимость компонента coders/txt.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03419
Уязвимость функции IntensityCompare() компонента /MagickCore/quantize.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03420
Уязвимость функции GammaImage() компонента /MagickCore/enhance.c консольного графического редактора ImageMagick, связанная с делением на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03421
Уязвимость функции WritePALMImage() компонента /coders/palm.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03422
Уязвимость компонента coders/hdr.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03423
Уязвимость компонента MagickCore/resize.c консольного графического редактора ImageMagick, связанная с делением на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03424
Уязвимость функции ApplyEvaluateOperator() компонента /MagickCore/statistic.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03425
Уязвимость компонента MagickCore/segment.c консольного графического редактора ImageMagick, связанная с делением на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03426
Уязвимость компонента MagickCore/gem-private.h консольного графического редактора ImageMagick, связанная с делением на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03427
Уязвимость кодировщика изображений PALM консольного графического редактора ImageMagick, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03442
Уязвимость компонента MagickCore/statistic.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03588
Уязвимость функции MeanShiftImage консольного графического редактора ImageMagick, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03597
Уязвимость функции WritePNGImage консольного графического редактора ImageMagick, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2023-02643
Уязвимость функции ParseMetaGeometry() компонента MagickCore/geometry.c консольного графического редактора ImageMagick, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-02644
Уязвимость компонента MagickCore/statistic.c консольного графического редактора ImageMagick, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-6823
Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write.
- [oss-security] 20160926 CVE-2016-6823 - ImageMagick BMP Coder Out-Of-Bounds Write Vulnerability
- [oss-security] 20160926 CVE-2016-6823 - ImageMagick BMP Coder Out-Of-Bounds Write Vulnerability
- 93158
- 93158
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834504
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834504
- https://github.com/ImageMagick/ImageMagick/commit/4cc6ec8a4197d4c008577127736bf7985d632323
- https://github.com/ImageMagick/ImageMagick/commit/4cc6ec8a4197d4c008577127736bf7985d632323
Modified: 2024-11-21
CVE-2019-13135
ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
- openSUSE-SU-2019:1983
- openSUSE-SU-2019:1983
- https://github.com/ImageMagick/ImageMagick/commit/cdb383749ef7b68a38891440af8cc23e0115306d
- https://github.com/ImageMagick/ImageMagick/commit/cdb383749ef7b68a38891440af8cc23e0115306d
- https://github.com/ImageMagick/ImageMagick/issues/1599
- https://github.com/ImageMagick/ImageMagick/issues/1599
- https://github.com/ImageMagick/ImageMagick6/commit/1e59b29e520d2beab73e8c78aacd5f1c0d76196d
- https://github.com/ImageMagick/ImageMagick6/commit/1e59b29e520d2beab73e8c78aacd5f1c0d76196d
- [debian-lts-announce] 20190816 [SECURITY] [DLA 1888-1] imagemagick security update
- [debian-lts-announce] 20190816 [SECURITY] [DLA 1888-1] imagemagick security update
- [debian-lts-announce] 20200907 [SECURITY] [DLA 2366-1] imagemagick security update
- [debian-lts-announce] 20200907 [SECURITY] [DLA 2366-1] imagemagick security update
- https://support.f5.com/csp/article/K20336394
- https://support.f5.com/csp/article/K20336394
- https://support.f5.com/csp/article/K20336394?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K20336394?utm_source=f5support&%3Butm_medium=RSS
- USN-4192-1
- USN-4192-1
- DSA-4712
- DSA-4712
Modified: 2024-11-21
CVE-2019-13137
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
- openSUSE-SU-2019:1983
- openSUSE-SU-2019:1983
- https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
- https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
- https://github.com/ImageMagick/ImageMagick/issues/1601
- https://github.com/ImageMagick/ImageMagick/issues/1601
- https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
- https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
- USN-4192-1
- USN-4192-1
- DSA-4712
- DSA-4712
Modified: 2024-11-21
CVE-2019-14980
In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.
- openSUSE-SU-2019:2515
- openSUSE-SU-2019:2515
- openSUSE-SU-2019:2519
- openSUSE-SU-2019:2519
- https://github.com/ImageMagick/ImageMagick/commit/c5d012a46ae22be9444326aa37969a3f75daa3ba
- https://github.com/ImageMagick/ImageMagick/commit/c5d012a46ae22be9444326aa37969a3f75daa3ba
- https://github.com/ImageMagick/ImageMagick/compare/7.0.8-41...7.0.8-42
- https://github.com/ImageMagick/ImageMagick/compare/7.0.8-41...7.0.8-42
- https://github.com/ImageMagick/ImageMagick6/commit/614a257295bdcdeda347086761062ac7658b6830
- https://github.com/ImageMagick/ImageMagick6/commit/614a257295bdcdeda347086761062ac7658b6830
- https://github.com/ImageMagick/ImageMagick6/issues/43
- https://github.com/ImageMagick/ImageMagick6/issues/43
Modified: 2024-11-21
CVE-2019-14981
In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
- openSUSE-SU-2019:2515
- openSUSE-SU-2019:2515
- openSUSE-SU-2019:2519
- openSUSE-SU-2019:2519
- https://github.com/ImageMagick/ImageMagick/commit/a77d8d97f5a7bced0468f0b08798c83fb67427bc
- https://github.com/ImageMagick/ImageMagick/commit/a77d8d97f5a7bced0468f0b08798c83fb67427bc
- https://github.com/ImageMagick/ImageMagick/issues/1552
- https://github.com/ImageMagick/ImageMagick/issues/1552
- https://github.com/ImageMagick/ImageMagick6/commit/b522d2d857d2f75b659936b59b0da9df1682c256
- https://github.com/ImageMagick/ImageMagick6/commit/b522d2d857d2f75b659936b59b0da9df1682c256
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1968-1] imagemagick security update
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1968-1] imagemagick security update
- [debian-lts-announce] 20200818 [SECURITY] [DLA 2333-1] imagemagick security update
- [debian-lts-announce] 20200818 [SECURITY] [DLA 2333-1] imagemagick security update
- USN-4192-1
- USN-4192-1
- DSA-4712
- DSA-4712
Modified: 2024-11-21
CVE-2019-17541
ImageMagick before 7.0.8-55 has a use-after-free in DestroyStringInfo in MagickCore/string.c because the error manager is mishandled in coders/jpeg.c.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15827
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15827
- https://github.com/ImageMagick/ImageMagick/commit/39f226a9c137f547e12afde972eeba7551124493
- https://github.com/ImageMagick/ImageMagick/commit/39f226a9c137f547e12afde972eeba7551124493
- https://github.com/ImageMagick/ImageMagick/compare/7.0.8-54...7.0.8-55
- https://github.com/ImageMagick/ImageMagick/compare/7.0.8-54...7.0.8-55
- https://github.com/ImageMagick/ImageMagick/issues/1641
- https://github.com/ImageMagick/ImageMagick/issues/1641
Modified: 2024-11-21
CVE-2019-19949
In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare.
- openSUSE-SU-2020:0170
- openSUSE-SU-2020:0170
- https://github.com/ImageMagick/ImageMagick/issues/1561
- https://github.com/ImageMagick/ImageMagick/issues/1561
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2049-1] imagemagick security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2049-1] imagemagick security update
- [debian-lts-announce] 20200818 [SECURITY] [DLA 2333-1] imagemagick security update
- [debian-lts-announce] 20200818 [SECURITY] [DLA 2333-1] imagemagick security update
- USN-4549-1
- USN-4549-1
- DSA-4712
- DSA-4712
Modified: 2024-11-21
CVE-2020-25664
In WriteOnePNGImage() of the PNG coder at coders/png.c, an improper call to AcquireVirtualMemory() and memset() allows for an out-of-bounds write later when PopShortPixel() from MagickCore/quantum-private.h is called. The patch fixes the calls by adding 256 to rowbytes. An attacker who is able to supply a specially crafted image could affect availability with a low impact to data integrity. This flaw affects ImageMagick versions prior to 6.9.10-68 and 7.0.8-68.
Modified: 2024-11-21
CVE-2020-25665
The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891606
- https://bugzilla.redhat.com/show_bug.cgi?id=1891606
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-25666
There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891612
- https://bugzilla.redhat.com/show_bug.cgi?id=1891612
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-25667
TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0.
Modified: 2024-11-21
CVE-2020-25674
WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891928
- https://bugzilla.redhat.com/show_bug.cgi?id=1891928
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-25675
In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative impact to application availability or other problems related to undefined behavior, in cases where ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891933
- https://bugzilla.redhat.com/show_bug.cgi?id=1891933
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-25676
In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891934
- https://bugzilla.redhat.com/show_bug.cgi?id=1891934
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27750
A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891984
- https://bugzilla.redhat.com/show_bug.cgi?id=1891984
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27751
A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891994
- https://bugzilla.redhat.com/show_bug.cgi?id=1891994
- [debian-lts-announce] 20210603 [SECURITY] [DLA 2672-1] imagemagick security update
- [debian-lts-announce] 20210603 [SECURITY] [DLA 2672-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27753
There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0.
Modified: 2024-11-21
CVE-2020-27754
In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894231
- https://bugzilla.redhat.com/show_bug.cgi?id=1894231
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27755
in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0.
Modified: 2024-11-21
CVE-2020-27756
In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions. This flaw affects ImageMagick versions prior to 7.0.9-0.
Modified: 2024-11-21
CVE-2020-27757
A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894234
- https://bugzilla.redhat.com/show_bug.cgi?id=1894234
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27758
A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894236
- https://bugzilla.redhat.com/show_bug.cgi?id=1894236
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27759
In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned, which in some cases caused a value outside the range of type `int` to be returned. The flaw could be triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894238
- https://bugzilla.redhat.com/show_bug.cgi?id=1894238
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27760
In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894239
- https://bugzilla.redhat.com/show_bug.cgi?id=1894239
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27761
WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product Security marked the Severity as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to ImageMagick 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894679
- https://bugzilla.redhat.com/show_bug.cgi?id=1894679
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27762
A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894680
- https://bugzilla.redhat.com/show_bug.cgi?id=1894680
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27763
A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894682
- https://bugzilla.redhat.com/show_bug.cgi?id=1894682
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27764
In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 6.9.10-69.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894683
- https://bugzilla.redhat.com/show_bug.cgi?id=1894683
- https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
- https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27765
A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894684
- https://bugzilla.redhat.com/show_bug.cgi?id=1894684
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27766
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-69.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894686
- https://bugzilla.redhat.com/show_bug.cgi?id=1894686
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27767
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894687
- https://bugzilla.redhat.com/show_bug.cgi?id=1894687
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27770
Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894691
- https://bugzilla.redhat.com/show_bug.cgi?id=1894691
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27771
In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1898290
- https://bugzilla.redhat.com/show_bug.cgi?id=1898290
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27772
A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1898291
- https://bugzilla.redhat.com/show_bug.cgi?id=1898291
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27773
A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1898295
- https://bugzilla.redhat.com/show_bug.cgi?id=1898295
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27774
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1898296
- https://bugzilla.redhat.com/show_bug.cgi?id=1898296
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27775
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1898300
- https://bugzilla.redhat.com/show_bug.cgi?id=1898300
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27776
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
Closed bugs
showfoto падает при открытии файла изображения
Package mate-session updated to version 1.22.2-alt2 for branch p9 in task 246777.
Closed bugs
Недопереведены сообщения в диалоге выхода из mate-session
Недостатки локализации в диалоге завершения работы
Closed vulnerabilities
BDU:2019-01943
Уязвимость компонента «Authoritative Server» DNS-сервера PowerDNS, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03644
Уязвимость функции синтаксического анализа DNS-сервера PowerDNS, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03645
Уязвимость DNS-сервера PowerDNS, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-15091
An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via the api-readonly keyword. This missing check allows an attacker with valid API credentials to flush the cache, trigger a zone transfer or send a NOTIFY.
Modified: 2024-11-21
CVE-2018-1046
pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurs when the -ecs-stamp option of dnsreplay is used.
Modified: 2024-11-21
CVE-2018-10851
PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html
- https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html
- https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html
Modified: 2024-11-21
CVE-2018-14626
PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html
- https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626
- https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html
Modified: 2024-11-21
CVE-2019-10162
A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.
- openSUSE-SU-2019:1904
- openSUSE-SU-2019:1904
- openSUSE-SU-2019:1921
- openSUSE-SU-2019:1921
- https://blog.powerdns.com/2019/06/21/powerdns-authoritative-server-4-0-8-and-4-1-10-released/
- https://blog.powerdns.com/2019/06/21/powerdns-authoritative-server-4-0-8-and-4-1-10-released/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10162
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10162
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-04.html
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-04.html
Modified: 2024-11-21
CVE-2019-10163
A Vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.9, 4.0.8 allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.
- openSUSE-SU-2019:1904
- openSUSE-SU-2019:1904
- openSUSE-SU-2019:1921
- openSUSE-SU-2019:1921
- https://blog.powerdns.com/2019/06/21/powerdns-authoritative-server-4-0-8-and-4-1-10-released/
- https://blog.powerdns.com/2019/06/21/powerdns-authoritative-server-4-0-8-and-4-1-10-released/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10163
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10163
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-05.html
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-05.html
Modified: 2024-11-21
CVE-2019-3871
A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of service by making the server connect to an invalid endpoint, or possibly information disclosure by making the server connect to an internal endpoint and somehow extracting meaningful information about the response
- openSUSE-SU-2019:1128
- openSUSE-SU-2019:1128
- [oss-security] 20190318 PowerDNS Security Advisory 2019-03
- [oss-security] 20190318 PowerDNS Security Advisory 2019-03
- 107491
- 107491
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3871
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3871
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html
- [debian-lts-announce] 20190329 [SECURITY] [DLA 1737-1] pdns security update
- [debian-lts-announce] 20190329 [SECURITY] [DLA 1737-1] pdns security update
- FEDORA-2019-b85d4171d4
- FEDORA-2019-b85d4171d4
- FEDORA-2019-9993d32c48
- FEDORA-2019-9993d32c48
- 20190404 [SECURITY] [DSA 4424-1] pdns security update
- 20190404 [SECURITY] [DSA 4424-1] pdns security update
- DSA-4424
- DSA-4424
Closed vulnerabilities
BDU:2019-00427
Уязвимость набора программного обеспечения для автоматической обработки конфигурации групп и назначения процессов для групп libcgroup, связанная с ошибками механизма разграничения доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2018-14348
libcgroup up to and including 0.41 creates /var/log/cgred with mode 0666 regardless of the configured umask, leading to disclosure of information.
- openSUSE-SU-2018:2241
- openSUSE-SU-2018:2241
- RHSA-2019:2047
- RHSA-2019:2047
- https://bugzilla.suse.com/show_bug.cgi?id=1100365
- https://bugzilla.suse.com/show_bug.cgi?id=1100365
- [debian-lts-announce] 20180820 [SECURITY] [DLA 1472-1] libcgroup security update
- [debian-lts-announce] 20180820 [SECURITY] [DLA 1472-1] libcgroup security update
- FEDORA-2018-f6adf1cb62
- FEDORA-2018-f6adf1cb62
- https://sourceforge.net/p/libcg/libcg/ci/0d88b73d189ea3440ccaab00418d6469f76fa590/
- https://sourceforge.net/p/libcg/libcg/ci/0d88b73d189ea3440ccaab00418d6469f76fa590/