Date: Thu, 13 May 2021 14:43:30 GMT From: Thierry Thomas <thierry@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: e34fc76d3330 - main - security/vuxml: declare vulnerabilities for ImageMagick6 Message-ID: <202105131443.14DEhUDF059750@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by thierry: URL: https://cgit.FreeBSD.org/ports/commit/?id=e34fc76d33306c0a9b886728887f4b43692825dc commit e34fc76d33306c0a9b886728887f4b43692825dc Author: Thierry Thomas <thierry@FreeBSD.org> AuthorDate: 2021-05-13 14:41:30 +0000 Commit: Thierry Thomas <thierry@FreeBSD.org> CommitDate: 2021-05-13 14:43:16 +0000 security/vuxml: declare vulnerabilities for ImageMagick6 PR: 255818 --- security/vuxml/vuln.xml | 41 ++++++++++++++++++++++++++++++++++++++++- 1 file changed, 40 insertions(+), 1 deletion(-) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 9e7891c85262..be24ed73c849 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -76,13 +76,52 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3e0ca488-b3f6-11eb-a5f7-a0f3c100ae18"> + <topic>ImageMagick6 -- multiple vulnerabilities</topic> + <affects> + <package> + <name>ImageMagick6</name> + <name>ImageMagick6-nox11</name> + <range><lt>6.9.12.12,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>CVE reports:</p> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=ImageMagick"> + <p>Several vulnerabilities have been discovered in ImageMagick:</p> + <ul> + <li>CVE-2021-20309: A flaw was found in ImageMagick in versions before 6.9.12, + where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger + undefined behavior via a crafted image file submitted to an application using ImageMagick.</li> + <li>CVE-2021-20176: A divide-by-zero flaw was found in ImageMagick 6.9.11-57 in gem.c. + This flaw allows an attacker who submits a crafted file that is processed by ImageMagick + to trigger undefined behavior through a division by zero.</li> + <li>CVE-2020-29599: ImageMagick before 6.9.11-40 mishandles the -authenticate option, + which allows setting a password for password-protected PDF files.</li> + <li>And maybe some others…</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2020-29599</cvename> + <cvename>CVE-2021-20176</cvename> + <cvename>CVE-2021-20309</cvename> + </references> + <dates> + <discovery>2020-12-17</discovery> + <entry>2021-05-13</entry> + </dates> + </vuln> + <vuln vid="a7c60af1-b3f1-11eb-a5f7-a0f3c100ae18"> <topic>ImageMagick7 -- multiple vulnerabilities</topic> <affects> <package> <name>ImageMagick7</name> <name>ImageMagick7-nox11</name> - <range><lt>7.0.11-12</lt></range> + <range><lt>7.0.11.12</lt></range> </package> </affects> <description>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202105131443.14DEhUDF059750>