In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2602-1 | imagemagick security update |
Debian DLA |
DLA-3357-1 | imagemagick security update |
EUVD |
EUVD-2020-20258 | In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69. |
Ubuntu USN |
USN-4988-1 | ImageMagick vulnerabilities |
Ubuntu USN |
USN-7068-1 | ImageMagick vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T16:18:45.822Z
Reserved: 2020-10-27T00:00:00
Link: CVE-2020-27754
No data.
Status : Modified
Published: 2020-12-08T22:15:18.227
Modified: 2024-11-21T05:21:45.990
Link: CVE-2020-27754
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN