ALT-PU-2019-3182-1
Package ImageMagick updated to version 6.9.10.74-alt1 for branch sisyphus in task 241601.
Closed vulnerabilities
BDU:2021-01010
Уязвимость функций в файлах MagickCore/colorspace-private.h и MagickCore/quantum.h консольного графического редактора ImageMagick, свзанная с ошибками деления на ноль, позволяющая нарушителю вызвать состояние отказа в обслуживании
BDU:2021-01016
Уязвимость функции IntensityCompare() консольного графического редактора ImageMagick, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01035
Уязвимость функции SetImageExtent() консольного графического редактора ImageMagick, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01036
Уязвимость консольного графического редактора ImageMagick, связанная с ошибками освобождения памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01037
Уязвимость функции консольного графического редактора ImageMagick, связанная с целочисленным переполнением, позволяющая нарушителю вызвать состояние отказа в обслуживании
BDU:2021-03381
Уязвимость функции SubstituteString() компонента MagickCore/string.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03404
Уязвимость компонента MagickCore/quantum.h консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03405
Уязвимость компонента MagickCore/quantum.h консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03406
Уязвимость компонента coders/bmp.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03407
Уязвимость функции RestoreMSCWarning() компонента /coders/pdf.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03410
Уязвимость компонента MagickCore/statistic.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-03411
Уязвимость функции HistogramCompare() компонента MagickCore/histogram.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03414
Уязвимость функции WriteOnePNGImage() компонента coders/png.c консольного графического редактора ImageMagick, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03415
Уязвимость процедур CropImage() и CropImageToTiles() компонента MagickCore/transform.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03416
Уязвимость функций CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), InterpolatePixelInfo() компонента /MagickCore/pixel.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03417
Уязвимость функции ScaleAnyToQuantum() компонента /MagickCore/quantum-private.h консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03418
Уязвимость компонента coders/txt.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03419
Уязвимость функции IntensityCompare() компонента /MagickCore/quantize.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03420
Уязвимость функции GammaImage() компонента /MagickCore/enhance.c консольного графического редактора ImageMagick, связанная с делением на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03421
Уязвимость функции WritePALMImage() компонента /coders/palm.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03422
Уязвимость компонента coders/hdr.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03423
Уязвимость компонента MagickCore/resize.c консольного графического редактора ImageMagick, связанная с делением на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03424
Уязвимость функции ApplyEvaluateOperator() компонента /MagickCore/statistic.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03425
Уязвимость компонента MagickCore/segment.c консольного графического редактора ImageMagick, связанная с делением на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03426
Уязвимость компонента MagickCore/gem-private.h консольного графического редактора ImageMagick, связанная с делением на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03427
Уязвимость кодировщика изображений PALM консольного графического редактора ImageMagick, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03442
Уязвимость компонента MagickCore/statistic.c консольного графического редактора ImageMagick, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-02643
Уязвимость функции ParseMetaGeometry() компонента MagickCore/geometry.c консольного графического редактора ImageMagick, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-02644
Уязвимость компонента MagickCore/statistic.c консольного графического редактора ImageMagick, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-25664
In WriteOnePNGImage() of the PNG coder at coders/png.c, an improper call to AcquireVirtualMemory() and memset() allows for an out-of-bounds write later when PopShortPixel() from MagickCore/quantum-private.h is called. The patch fixes the calls by adding 256 to rowbytes. An attacker who is able to supply a specially crafted image could affect availability with a low impact to data integrity. This flaw affects ImageMagick versions prior to 6.9.10-68 and 7.0.8-68.
Modified: 2024-11-21
CVE-2020-25665
The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891606
- https://bugzilla.redhat.com/show_bug.cgi?id=1891606
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-25666
There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891612
- https://bugzilla.redhat.com/show_bug.cgi?id=1891612
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-25667
TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0.
Modified: 2024-11-21
CVE-2020-25674
WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891928
- https://bugzilla.redhat.com/show_bug.cgi?id=1891928
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-25675
In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative impact to application availability or other problems related to undefined behavior, in cases where ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891933
- https://bugzilla.redhat.com/show_bug.cgi?id=1891933
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-25676
In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891934
- https://bugzilla.redhat.com/show_bug.cgi?id=1891934
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27750
A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891984
- https://bugzilla.redhat.com/show_bug.cgi?id=1891984
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27751
A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1891994
- https://bugzilla.redhat.com/show_bug.cgi?id=1891994
- [debian-lts-announce] 20210603 [SECURITY] [DLA 2672-1] imagemagick security update
- [debian-lts-announce] 20210603 [SECURITY] [DLA 2672-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27753
There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0.
Modified: 2024-11-21
CVE-2020-27754
In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894231
- https://bugzilla.redhat.com/show_bug.cgi?id=1894231
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27755
in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0.
Modified: 2024-11-21
CVE-2020-27756
In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions. This flaw affects ImageMagick versions prior to 7.0.9-0.
Modified: 2024-11-21
CVE-2020-27757
A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894234
- https://bugzilla.redhat.com/show_bug.cgi?id=1894234
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27758
A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894236
- https://bugzilla.redhat.com/show_bug.cgi?id=1894236
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27759
In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned, which in some cases caused a value outside the range of type `int` to be returned. The flaw could be triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894238
- https://bugzilla.redhat.com/show_bug.cgi?id=1894238
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27760
In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894239
- https://bugzilla.redhat.com/show_bug.cgi?id=1894239
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27761
WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product Security marked the Severity as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to ImageMagick 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894679
- https://bugzilla.redhat.com/show_bug.cgi?id=1894679
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27762
A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894680
- https://bugzilla.redhat.com/show_bug.cgi?id=1894680
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27763
A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894682
- https://bugzilla.redhat.com/show_bug.cgi?id=1894682
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27764
In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 6.9.10-69.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894683
- https://bugzilla.redhat.com/show_bug.cgi?id=1894683
- https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
- https://github.com/ImageMagick/ImageMagick6/commit/3e21bc8a58b4ae38d24c7e283837cc279f35b6a5
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27765
A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894684
- https://bugzilla.redhat.com/show_bug.cgi?id=1894684
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27766
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-69.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894686
- https://bugzilla.redhat.com/show_bug.cgi?id=1894686
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27767
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894687
- https://bugzilla.redhat.com/show_bug.cgi?id=1894687
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27770
Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894691
- https://bugzilla.redhat.com/show_bug.cgi?id=1894691
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27771
In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1898290
- https://bugzilla.redhat.com/show_bug.cgi?id=1898290
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27772
A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1898291
- https://bugzilla.redhat.com/show_bug.cgi?id=1898291
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27773
A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1898295
- https://bugzilla.redhat.com/show_bug.cgi?id=1898295
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20210112 [SECURITY] [DLA 2523-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27774
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1898296
- https://bugzilla.redhat.com/show_bug.cgi?id=1898296
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27775
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1898300
- https://bugzilla.redhat.com/show_bug.cgi?id=1898300
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
- [debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update
Modified: 2024-11-21
CVE-2020-27776
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.