Bug 1894226 (CVE-2020-27752) - CVE-2020-27752 ImageMagick: heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h
Summary: CVE-2020-27752 ImageMagick: heap-based buffer overflow in PopShortPixel in Ma...
Alias: CVE-2020-27752
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1901247 1901248 1910554
Blocks: 1891602
TreeView+ depends on / blocked
Reported: 2020-11-03 18:40 UTC by Guilherme de Almeida Suckevicz
Modified: 2021-04-29 23:39 UTC (History)
7 users (show)

Fixed In Version: ImageMagick 7.0.9-0
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in ImageMagick in MagickCore/quantum-private.h. This flaw allows an attacker who submits a crafted file processed by ImageMagick to trigger a heap buffer overflow. The highest threat from this vulnerability is to system availability and also a potential impact on data integrity.
Clone Of:
Last Closed: 2020-11-24 23:34:23 UTC

Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2020-11-03 18:40:42 UTC
In ImageMagick, there is a heap-buffer-overflow at MagickCore/quantum-private.h:227 in PopShortPixel.


Upstream patch:

Comment 1 Guilherme de Almeida Suckevicz 2020-11-03 18:40:44 UTC

Name: Suhwan Song (Seoul National University)

Comment 2 Todd Cullum 2020-11-03 22:37:44 UTC
This looks like the fix for CVE-2020-25664 was an incomplete fix hence the second reproducer which triggers the same thing via the same code path after the patch was applied.

Comment 4 Todd Cullum 2020-11-03 22:41:41 UTC

This flaw is out of support scope for Red Hat Enterprise Linux 5, 6, and 7. Inkscape is not affected because it no longer uses a bundled ImageMagick in Red Hat Enterprise Linux 8. For more information regarding support scopes, please see https://access.redhat.com/support/policy/updates/errata .

Comment 6 Guilherme de Almeida Suckevicz 2020-11-24 19:11:55 UTC
Created ImageMagick tracking bugs for this issue:

Affects: epel-8 [bug 1901247]
Affects: fedora-all [bug 1901248]

Comment 7 Product Security DevOps Team 2020-11-24 23:34:23 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):


Note You need to log in before you can comment on or make changes to this bug.