First published: Wed Nov 04 2020(Updated: )
In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 6.9.10-69.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | <6.9.10-69 | |
Debian Debian Linux | =9.0 | |
redhat/ImageMagick 6.9.10 | <69 | 69 |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.39+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-27764 is medium with a severity value of 3.3.
The affected software is ImageMagick.
Ubuntu versions 18.04 (Bionic), 20.04 (Focal), and 20.10 (Groovy) are affected by CVE-2020-27764.
To fix CVE-2020-27764 on Ubuntu, update ImageMagick to version 8:6.9.7.4+dfsg-16ubuntu6.11 for Bionic, 8:6.9.10.23+dfsg-2.1ubuntu11.4 for Focal, or 8:6.9.10.23+dfsg-2.1ubuntu13.3 for Groovy.
You can find more information about CVE-2020-27764 on the official CVE-Mitre website, Ubuntu Security Notices, and NVD.