Date: Thu, 13 May 2021 14:43:29 GMT From: Thierry Thomas <thierry@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 0e7c332de8bb - main - security/vuxml: declare vulnerabilities for ImageMagick7 Message-ID: <202105131443.14DEhTpL059729@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by thierry: URL: https://cgit.FreeBSD.org/ports/commit/?id=0e7c332de8bbd7100f615c8b07569925f6a2e42c commit 0e7c332de8bbd7100f615c8b07569925f6a2e42c Author: Thierry Thomas <thierry@FreeBSD.org> AuthorDate: 2021-05-13 14:17:39 +0000 Commit: Thierry Thomas <thierry@FreeBSD.org> CommitDate: 2021-05-13 14:43:16 +0000 security/vuxml: declare vulnerabilities for ImageMagick7 PR: 255802 --- security/vuxml/vuln.xml | 60 ++++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 59 insertions(+), 1 deletion(-) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 85df1126f2c9..9e7891c85262 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -76,8 +76,66 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="a7c60af1-b3f1-11eb-a5f7-a0f3c100ae18"> + <topic>ImageMagick7 -- multiple vulnerabilities</topic> + <affects> + <package> + <name>ImageMagick7</name> + <name>ImageMagick7-nox11</name> + <range><lt>7.0.11-12</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>CVE reports:</p> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=ImageMagick"> + <p>Several vulnerabilities have been discovered in ImageMagick:</p> + <ul> + <li>CVE-2021-20313: A flaw was found in ImageMagick in versions before 7.0.11. + A potential cipher leak when the calculate signatures in TransformSignature is possible.</li> + <li>CVE-2021-20312: A flaw was found in ImageMagick in versions 7.0.11, + where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger + undefined behavior via a crafted image file that is submitted by an attacker and + processed by an application using ImageMagick.</li> + <li>CVE-2021-20311: A flaw was found in ImageMagick in versions before 7.0.11, + where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c + may trigger undefined behavior via a crafted image file that is submitted by an + attacker processed by an application using ImageMagick.</li> + <li>CVE-2021-20310: A flaw was found in ImageMagick in versions before 7.0.11, + where a division by zero ConvertXYZToJzazbz() of MagickCore/colorspace.c may trigger + undefined behavior via a crafted image file that is submitted by an attacker + and processed by an application using ImageMagick.</li> + <li>CVE-2021-20309: A flaw was found in ImageMagick in versions before 7.0.11, + where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger + undefined behavior via a crafted image file submitted to an application using ImageMagick.</li> + <li>And several others…</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2020-27829</cvename> + <cvename>CVE-2020-29599</cvename> + <cvename>CVE-2021-20176</cvename> + <cvename>CVE-2021-20241</cvename> + <cvename>CVE-2021-20243</cvename> + <cvename>CVE-2021-20244</cvename> + <cvename>CVE-2021-20245</cvename> + <cvename>CVE-2021-20246</cvename> + <cvename>CVE-2021-20309</cvename> + <cvename>CVE-2021-20310</cvename> + <cvename>CVE-2021-20311</cvename> + <cvename>CVE-2021-20312</cvename> + <cvename>CVE-2021-20313</cvename> + </references> + <dates> + <discovery>2020-10-27</discovery> + <entry>2021-05-13</entry> + </dates> + </vuln> + <vuln vid="f947aa26-b2f9-11eb-a5f7-a0f3c100ae18"> - <topic>Pillow -- multiple vulnerabilitie</topic> + <topic>Pillow -- multiple vulnerabilities</topic> <affects> <package> <name>py38-pillow</name>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202105131443.14DEhTpL059729>