Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2020-27771

Published: 4 December 2020

In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0.

Priority

Low

Cvss 3 Severity Score

3.3

Score breakdown

Status

Package Release Status
imagemagick
Launchpad, Ubuntu, Debian
hirsute Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
focal
Released (8:6.9.10.23+dfsg-2.1ubuntu11.4)
groovy
Released (8:6.9.10.23+dfsg-2.1ubuntu13.3)
impish Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
upstream
Released (8:6.9.11.24+dfsg-1)
bionic
Released (8:6.9.7.4+dfsg-16ubuntu6.11)
trusty Needed

jammy Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
kinetic Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
xenial Needed

lunar Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
mantic Not vulnerable
(8:6.9.11.60+dfsg-1ubuntu1)
Patches:
upstream: https://github.com/ImageMagick/ImageMagick6/commit/a07ecde4c1c3a3efaa628434adc903295f6bb2b3

Severity score breakdown

Parameter Value
Base score 3.3
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact Low
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L