In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2602-1 imagemagick security update
Debian DLA Debian DLA DLA-3357-1 imagemagick security update
EUVD EUVD EUVD-2020-20258 In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.
Ubuntu USN Ubuntu USN USN-4988-1 ImageMagick vulnerabilities
Ubuntu USN Ubuntu USN USN-7068-1 ImageMagick vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T16:18:45.822Z

Reserved: 2020-10-27T00:00:00

Link: CVE-2020-27754

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-08T22:15:18.227

Modified: 2024-11-21T05:21:45.990

Link: CVE-2020-27754

cve-icon Redhat

Severity : Low

Publid Date: 2019-10-14T00:00:00Z

Links: CVE-2020-27754 - Bugzilla

cve-icon OpenCVE Enrichment

No data.