Description
In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2602-1 | imagemagick security update |
Debian DLA |
DLA-3357-1 | imagemagick security update |
EUVD |
EUVD-2020-20258 | In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69. |
Ubuntu USN |
USN-4988-1 | ImageMagick vulnerabilities |
Ubuntu USN |
USN-7068-1 | ImageMagick vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T16:18:45.822Z
Reserved: 2020-10-27T00:00:00.000Z
Link: CVE-2020-27754
No data.
Status : Modified
Published: 2020-12-08T22:15:18.227
Modified: 2024-11-21T05:21:45.990
Link: CVE-2020-27754
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN