Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 681724 (CVE-2019-9956) - <media-gfx/imagemagick-7.0.8.38: stack-based buffer overflow in function PopHexPixel in coders/ps.c (CVE-2019-9956)
Summary: <media-gfx/imagemagick-7.0.8.38: stack-based buffer overflow in function PopH...
Status: RESOLVED FIXED
Alias: CVE-2019-9956
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2019-03-25 11:33 UTC by Agostino Sarubbo
Modified: 2020-04-16 07:25 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2019-03-25 11:33:26 UTC
From ${URL} :

In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to 
cause a denial of service or code execution via a crafted image file.

Reference:
https://github.com/ImageMagick/ImageMagick/issues/1523



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Yury German Gentoo Infrastructure gentoo-dev 2020-04-16 07:25:10 UTC
As per upstream: main/imagemagick: security upgrade to 7.0.8.38 #6869
7.0.8 no longer in tree
GLSA Vote: No
Thank you all for you work. 
Closing as [noglsa].