Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 681724 (CVE-2019-9956)

Summary: <media-gfx/imagemagick-7.0.8.38: stack-based buffer overflow in function PopHexPixel in coders/ps.c (CVE-2019-9956)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: graphics+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=1692300
Whiteboard: B3 [noglsa cve]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2019-03-25 11:33:26 UTC
From ${URL} :

In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to 
cause a denial of service or code execution via a crafted image file.

Reference:
https://github.com/ImageMagick/ImageMagick/issues/1523



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Yury German Gentoo Infrastructure gentoo-dev 2020-04-16 07:25:10 UTC
As per upstream: main/imagemagick: security upgrade to 7.0.8.38 #6869
7.0.8 no longer in tree
GLSA Vote: No
Thank you all for you work. 
Closing as [noglsa].