Docker circleci/node:9.0-stretch-browsers

Vulnerabilities

1294 via 6282 paths

Dependencies

615

Source

Group 6 Copy Created with Sketch. Docker

Target OS

debian:9
Test your Docker Hub image against our market leading vulnerability database Sign up for free
Severity
  • 398
  • 363
  • 533
Status
  • 1294
  • 0
  • 0
OS binaries
  • 1284
  • 10

high severity

Arbitrary Code Injection

  • Vulnerable module: apt
  • Introduced through: apt@1.4.8 and apt/libapt-pkg5.0@1.4.8
  • Fixed in: 1.4.9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* apt@1.4.8
  • Introduced through: circleci/node:9.0-stretch-browsers@* apt/libapt-pkg5.0@1.4.8

Overview

Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.

References

high severity

Improper Input Validation

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during "readelf -a" execution.

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in malloc() with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, interpret a -1 value as a sorting count instead of an error flag, which allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.

References

high severity

Missing Release of Resource after Effective Lifetime

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The bfd_make_section_with_flags function in section.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a NULL dereference via a crafted file.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The setup_group function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a group section that is too small.

References

high severity

Out-of-Bounds

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file.

References

high severity

Out-of-Bounds

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.

References

high severity

Out-of-bounds Read

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The evax_bfd_print_emh function in vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.

References

high severity

Out-of-bounds Read

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The _bfd_xcoff_read_ar_hdr function in bfd/coff-rs6000.c and bfd/coff64-rs6000.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds stack read via a crafted COFF image file.

References

high severity

Out-of-bounds Read

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The bfd_mach_o_i386_canonicalize_one_reloc function in bfd/mach-o-i386.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted mach-o file.

References

high severity

Out-of-bounds Read

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The _bfd_vms_slurp_eeom function in libbfd.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.

References

high severity

Out-of-bounds Read

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The _bfd_vms_slurp_egsd function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an arbitrary memory read via a crafted vms alpha file.

References

high severity

Out-of-bounds Read

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The nlm_swap_auxiliary_headers_in function in bfd/nlmcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted nlm file.

References

high severity

Out-of-bounds Read

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils 2.29 and earlier allows remote attackers to cause an out of bounds heap read via a crafted binary file.

References

high severity

Out-of-bounds Read

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The _bfd_vms_save_sized_string function in vms-misc.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms file.

References

high severity

Out-of-bounds Write

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The alpha_vms_object_p function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted vms alpha file.

References

high severity

Out-of-bounds Write

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The bfd_mach_o_read_symtab_strtab function in bfd/mach-o.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted mach-o file.

References

high severity

Use After Free

  • Vulnerable module: binutils
  • Introduced through: binutils@2.28-5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* binutils@2.28-5

Overview

The bfd_cache_close function in bfd/cache.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a heap use after free and possibly achieve code execution via a crafted nested archive file. This issue occurs because incorrect functions are called during an attempt to release memory. The issue can be addressed by better input validation in the bfd_generic_archive_p function in bfd/archive.c.

References

high severity

Out-of-bounds Write

  • Vulnerable module: bzip2
  • Introduced through: bzip2@1.0.6-8.1, bzip2/libbz2-1.0@1.0.6-8.1 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* bzip2@1.0.6-8.1
  • Introduced through: circleci/node:9.0-stretch-browsers@* bzip2/libbz2-1.0@1.0.6-8.1
  • Introduced through: circleci/node:9.0-stretch-browsers@* bzip2/libbz2-dev@1.0.6-8.1

Overview

BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.

References

high severity

Arbitrary Command Injection

  • Vulnerable module: bzr
  • Introduced through: bzr@2.7.0+bzr6619-7 and bzr/python-bzrlib@2.7.0+bzr6619-7
  • Fixed in: 2.7.0+bzr6619-7+deb9u1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* bzr@2.7.0+bzr6619-7
  • Introduced through: circleci/node:9.0-stretch-browsers@* bzr/python-bzrlib@2.7.0+bzr6619-7

Overview

Bazaar through 2.7.0, when Subprocess SSH is used, allows remote attackers to execute arbitrary commands via a bzr+ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-16228, CVE-2017-1000116, and CVE-2017-1000117.

References

high severity

Access Restriction Bypass

  • Vulnerable module: cups/libcups2
  • Introduced through: cups/libcups2@2.2.1-8
  • Fixed in: 2.2.1-8+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* cups/libcups2@2.2.1-8

Overview

The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions prior to 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1 in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS, and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS.

References

high severity

Authentication Bypass

  • Vulnerable module: cups/libcups2
  • Introduced through: cups/libcups2@2.2.1-8
  • Fixed in: 2.2.1-8+deb9u1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* cups/libcups2@2.2.1-8

Overview

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

References

high severity

Buffer Overflow

  • Vulnerable module: cups/libcups2
  • Introduced through: cups/libcups2@2.2.1-8
  • Fixed in: 2.2.1-8+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* cups/libcups2@2.2.1-8

Overview

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.

References

high severity

Buffer Overflow

  • Vulnerable module: cups/libcups2
  • Introduced through: cups/libcups2@2.2.1-8
  • Fixed in: 2.2.1-8+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* cups/libcups2@2.2.1-8

Overview

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.

References

high severity

CRLF Injection

  • Vulnerable module: cups/libcups2
  • Introduced through: cups/libcups2@2.2.1-8
  • Fixed in: 2.2.1-8+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* cups/libcups2@2.2.1-8

Overview

Insufficient restriction of IPP filters in CUPS in Google Chrome OS prior to 62.0.3202.74 allowed a remote attacker to execute a command with the same privileges as the cups daemon via a crafted PPD file, aka a printer zeroconfig CRLF issue.

References

high severity

Improper Authorization

  • Vulnerable module: cups/libcups2
  • Introduced through: cups/libcups2@2.2.1-8
  • Fixed in: 2.2.1-8+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* cups/libcups2@2.2.1-8

Overview

In macOS High Sierra before 10.13.5, an issue existed in CUPS. This issue was addressed with improved access restrictions.

References

high severity

Out-of-Bounds

  • Vulnerable module: cups/libcups2
  • Introduced through: cups/libcups2@2.2.1-8
  • Fixed in: 2.2.1-8+deb9u6

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* cups/libcups2@2.2.1-8

Overview

A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. An application may be able to gain elevated privileges.

References

high severity

Arbitrary Code Injection

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u11

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

Affected versions of this package are vulnerable to Arbitrary Code Injection curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.

Remediation

Upgrade curl to version or higher.

References

high severity

Buffer Overflow

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

high severity

Double Free

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

high severity

Improper Certificate Validation

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u13

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

Affected versions of this package are vulnerable to Improper Certificate Validation curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

Remediation

Upgrade curl to version or higher.

References

high severity

Information Exposure

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the Location: response header value. Sending the same set of headers to subsequent hosts is in particular a problem for applications that pass on custom Authorization: headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request.

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u7

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

high severity

Out-of-Bounds

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u8

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.

References

high severity

Out-of-bounds Read

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to smtp_endofresp() isn't NUL terminated and contains no character ending the parsed number, and len is set to 5, then the strtol() call reads beyond the allocated buffer. The read contents will not be returned to the caller.

References

high severity

Out-of-bounds Read

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (lib/vauth/ntlm.c:ntlm_decode_type2_target) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

References

high severity

Out-of-bounds Read

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like : to the target buffer, while this was recently changed to : (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.

References

high severity

Out-of-bounds Read

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u6

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.

References

high severity

Out-of-bounds Read

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u8

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.

References

high severity

Out-of-bounds Read

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

high severity

Out-of-bounds Read

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.

References

high severity

Out-of-bounds Write

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u13

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

Affected versions of this package are vulnerable to Out-of-bounds Write curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

Remediation

Upgrade curl to version or higher.

References

high severity

Out-of-bounds Write

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large 'nt response' data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a 'large value' needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.

References

high severity

Out-of-bounds Write

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.

References

high severity

Out-of-bounds Write

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

high severity

Use After Free

  • Vulnerable module: curl
  • Introduced through: curl@7.52.1-5+deb9u2, curl/libcurl3@7.52.1-5+deb9u2 and others
  • Fixed in: 7.52.1-5+deb9u12

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* curl@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl3-gnutls@7.52.1-5+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* curl/libcurl4-openssl-dev@7.52.1-5+deb9u2

Overview

Affected versions of this package are vulnerable to Use After Free. Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.

Remediation

Upgrade curl to version or higher.

References

high severity

Out-of-bounds Write

  • Vulnerable module: cyrus-sasl2/libsasl2-2
  • Introduced through: cyrus-sasl2/libsasl2-2@2.1.27~101-g0780600+dfsg-3 and cyrus-sasl2/libsasl2-modules-db@2.1.27~101-g0780600+dfsg-3
  • Fixed in: 2.1.27~101-g0780600+dfsg-3+deb9u1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* cyrus-sasl2/libsasl2-2@2.1.27~101-g0780600+dfsg-3
  • Introduced through: circleci/node:9.0-stretch-browsers@* cyrus-sasl2/libsasl2-modules-db@2.1.27~101-g0780600+dfsg-3

Overview

cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.

References

high severity

Link Following

  • Vulnerable module: dbus/libdbus-1-3
  • Introduced through: dbus/libdbus-1-3@1.10.22-0+deb9u1
  • Fixed in: 1.10.28-0+deb9u1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* dbus/libdbus-1-3@1.10.22-0+deb9u1

Overview

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: djvulibre/libdjvulibre-dev
  • Introduced through: djvulibre/libdjvulibre-dev@3.5.27.1-7, djvulibre/libdjvulibre-text@3.5.27.1-7 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* djvulibre/libdjvulibre-dev@3.5.27.1-7
  • Introduced through: circleci/node:9.0-stretch-browsers@* djvulibre/libdjvulibre-text@3.5.27.1-7
  • Introduced through: circleci/node:9.0-stretch-browsers@* djvulibre/libdjvulibre21@3.5.27.1-7

Overview

DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp.

References

high severity

Improper Data Handling

  • Vulnerable module: exim4
  • Introduced through: exim4@4.89-2+deb9u1, exim4/exim4-base@4.89-2+deb9u1 and others
  • Fixed in: 4.89-2+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-base@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-config@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-daemon-light@4.89-2+deb9u1

Overview

Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).

References

high severity

Improper Input Validation

  • Vulnerable module: exim4
  • Introduced through: exim4@4.89-2+deb9u1, exim4/exim4-base@4.89-2+deb9u1 and others
  • Fixed in: 4.89-2+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-base@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-config@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-daemon-light@4.89-2+deb9u1

high severity

Loop with Unreachable Exit Condition ('Infinite Loop')

  • Vulnerable module: exim4
  • Introduced through: exim4@4.89-2+deb9u1, exim4/exim4-base@4.89-2+deb9u1 and others
  • Fixed in: 4.89-2+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-base@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-config@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-daemon-light@4.89-2+deb9u1

Overview

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function.

References

high severity

Out-of-Bounds

  • Vulnerable module: exim4
  • Introduced through: exim4@4.89-2+deb9u1, exim4/exim4-base@4.89-2+deb9u1 and others
  • Fixed in: 4.89-2+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-base@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-config@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-daemon-light@4.89-2+deb9u1

Overview

An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.

References

high severity

Out-of-Bounds

  • Vulnerable module: exim4
  • Introduced through: exim4@4.89-2+deb9u1, exim4/exim4-base@4.89-2+deb9u1 and others
  • Fixed in: 4.89-2+deb9u6

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-base@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-config@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-daemon-light@4.89-2+deb9u1

high severity

Out-of-bounds Read

  • Vulnerable module: exim4
  • Introduced through: exim4@4.89-2+deb9u1, exim4/exim4-base@4.89-2+deb9u1 and others
  • Fixed in: 4.89-2+deb9u7

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-base@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-config@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-daemon-light@4.89-2+deb9u1

Overview

Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.

References

high severity

Use After Free

  • Vulnerable module: exim4
  • Introduced through: exim4@4.89-2+deb9u1, exim4/exim4-base@4.89-2+deb9u1 and others
  • Fixed in: 4.89-2+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-base@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-config@4.89-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* exim4/exim4-daemon-light@4.89-2+deb9u1

Overview

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.

References

high severity

Out-of-bounds Read

  • Vulnerable module: expat/libexpat1
  • Introduced through: expat/libexpat1@2.2.0-2+deb9u1 and expat/libexpat1-dev@2.2.0-2+deb9u1
  • Fixed in: 2.2.0-2+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* expat/libexpat1@2.2.0-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* expat/libexpat1-dev@2.2.0-2+deb9u1

Overview

In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.

References

high severity

XML External Entity (XXE) Injection

  • Vulnerable module: expat/libexpat1
  • Introduced through: expat/libexpat1@2.2.0-2+deb9u1 and expat/libexpat1-dev@2.2.0-2+deb9u1
  • Fixed in: 2.2.0-2+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* expat/libexpat1@2.2.0-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* expat/libexpat1-dev@2.2.0-2+deb9u1

Overview

In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).

References

high severity

Out-of-bounds Read

  • Vulnerable module: file
  • Introduced through: file@1:5.30-1+deb9u1, file/libmagic-mgc@1:5.30-1+deb9u1 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* file@1:5.30-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* file/libmagic-mgc@1:5.30-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* file/libmagic1@1:5.30-1+deb9u1

Overview

do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360.

References

high severity

Out-of-bounds Write

  • Vulnerable module: file
  • Introduced through: file@1:5.30-1+deb9u1, file/libmagic-mgc@1:5.30-1+deb9u1 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* file@1:5.30-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* file/libmagic-mgc@1:5.30-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* file/libmagic1@1:5.30-1+deb9u1

Overview

do_core_note in readelf.c in libmagic.a in file 5.35 allows remote attackers to cause a denial of service (stack corruption and application crash) or possibly have unspecified other impact.

References

high severity

Out-of-bounds Write

  • Vulnerable module: file
  • Introduced through: file@1:5.30-1+deb9u1, file/libmagic-mgc@1:5.30-1+deb9u1 and others
  • Fixed in: 1:5.30-1+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* file@1:5.30-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* file/libmagic-mgc@1:5.30-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* file/libmagic1@1:5.30-1+deb9u1

Overview

cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).

References

high severity

Information Exposure

  • Vulnerable module: gcc-6
  • Introduced through: gcc-6@6.3.0-18, gcc-6/cpp-6@6.3.0-18 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/cpp-6@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/g++-6@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/gcc-6-base@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libasan3@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libatomic1@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libcc1-0@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libcilkrts5@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libgcc-6-dev@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libgcc1@1:6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libgomp1@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libitm1@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/liblsan0@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libmpx2@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libquadmath0@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libstdc++-6-dev@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libstdc++6@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libtsan0@6.3.0-18
  • Introduced through: circleci/node:9.0-stretch-browsers@* gcc-6/libubsan0@6.3.0-18

Overview

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: gdk-pixbuf/gir1.2-gdkpixbuf-2.0
  • Introduced through: gdk-pixbuf/gir1.2-gdkpixbuf-2.0@2.36.5-2+deb9u1, gdk-pixbuf/libgdk-pixbuf2.0-0@2.36.5-2+deb9u1 and others
  • Fixed in: 2.36.5-2+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* gdk-pixbuf/gir1.2-gdkpixbuf-2.0@2.36.5-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* gdk-pixbuf/libgdk-pixbuf2.0-0@2.36.5-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* gdk-pixbuf/libgdk-pixbuf2.0-common@2.36.5-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* gdk-pixbuf/libgdk-pixbuf2.0-dev@2.36.5-2+deb9u1

Overview

Gnome gdk-pixbuf 2.36.8 and older is vulnerable to several integer overflow in the gif_get_lzw function resulting in memory corruption and potential code execution

References

high severity

Integer Underflow

  • Vulnerable module: gdk-pixbuf/gir1.2-gdkpixbuf-2.0
  • Introduced through: gdk-pixbuf/gir1.2-gdkpixbuf-2.0@2.36.5-2+deb9u1, gdk-pixbuf/libgdk-pixbuf2.0-0@2.36.5-2+deb9u1 and others
  • Fixed in: 2.36.5-2+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* gdk-pixbuf/gir1.2-gdkpixbuf-2.0@2.36.5-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* gdk-pixbuf/libgdk-pixbuf2.0-0@2.36.5-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* gdk-pixbuf/libgdk-pixbuf2.0-common@2.36.5-2+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* gdk-pixbuf/libgdk-pixbuf2.0-dev@2.36.5-2+deb9u1

Overview

Integer underflow in the load_resources function in io-icns.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (out-of-bounds read and program crash) via a crafted image entry size in an ICO file.

References

high severity

Out-of-bounds Write

  • Vulnerable module: giflib/libgif7
  • Introduced through: giflib/libgif7@5.1.4-0.4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* giflib/libgif7@5.1.4-0.4

Overview

The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain "Private->RunningCode - 2" array index is not checked. This will lead to a denial of service or possibly unspecified other impact.

References

high severity

Out-of-bounds Write

  • Vulnerable module: giflib/libgif7
  • Introduced through: giflib/libgif7@5.1.4-0.4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* giflib/libgif7@5.1.4-0.4

Overview

The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain CrntCode array index is not checked. This will lead to a denial of service or possibly unspecified other impact.

References

high severity

Arbitrary Argument Injection

  • Vulnerable module: git
  • Introduced through: git@1:2.11.0-3+deb9u2 and git/git-man@1:2.11.0-3+deb9u2
  • Fixed in: 1:2.11.0-3+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* git@1:2.11.0-3+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* git/git-man@1:2.11.0-3+deb9u2

Overview

Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.

References

high severity

CVE-2019-1353

  • Vulnerable module: git
  • Introduced through: git@1:2.11.0-3+deb9u2 and git/git-man@1:2.11.0-3+deb9u2
  • Fixed in: 1:2.11.0-3+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* git@1:2.11.0-3+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* git/git-man@1:2.11.0-3+deb9u2

Overview

An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. When running Git in the Windows Subsystem for Linux (also known as "WSL") while accessing a working directory on a regular Windows drive, none of the NTFS protections were active.

References

high severity

Directory Traversal

  • Vulnerable module: git
  • Introduced through: git@1:2.11.0-3+deb9u2 and git/git-man@1:2.11.0-3+deb9u2
  • Fixed in: 1:2.11.0-3+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* git@1:2.11.0-3+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* git/git-man@1:2.11.0-3+deb9u2

Overview

In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.

References

high severity

Improper Input Validation

  • Vulnerable module: git
  • Introduced through: git@1:2.11.0-3+deb9u2 and git/git-man@1:2.11.0-3+deb9u2
  • Fixed in: 1:2.11.0-3+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* git@1:2.11.0-3+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* git/git-man@1:2.11.0-3+deb9u2

Overview

A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1354, CVE-2019-1387.

References

high severity

Improper Input Validation

  • Vulnerable module: git
  • Introduced through: git@1:2.11.0-3+deb9u2 and git/git-man@1:2.11.0-3+deb9u2
  • Fixed in: 1:2.11.0-3+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* git@1:2.11.0-3+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* git/git-man@1:2.11.0-3+deb9u2

Overview

A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.

References

high severity

Improper Input Validation

  • Vulnerable module: git
  • Introduced through: git@1:2.11.0-3+deb9u2 and git/git-man@1:2.11.0-3+deb9u2
  • Fixed in: 1:2.11.0-3+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* git@1:2.11.0-3+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* git/git-man@1:2.11.0-3+deb9u2

Overview

An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones.

References

high severity

Insufficiently Protected Credentials

  • Vulnerable module: git
  • Introduced through: git@1:2.11.0-3+deb9u2 and git/git-man@1:2.11.0-3+deb9u2
  • Fixed in: 1:2.11.0-3+deb9u6

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* git@1:2.11.0-3+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* git/git-man@1:2.11.0-3+deb9u2

Overview

Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g., good.example.com) for an HTTP request being made to another server (e.g., evil.example.com), resulting in credentials for the former being sent to the latter. There are no restrictions on the relationship between the two, meaning that an attacker can craft a URL that will present stored credentials for any host to a host of their choosing. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The problem has been patched in the versions published on April 14th, 2020, going back to v2.17.x. Anyone wishing to backport the change further can do so by applying commit 9a6bbee (the full release includes extra checks for git fsck, but that commit is sufficient to protect clients against the vulnerability). The patched versions are: 2.17.4, 2.18.3, 2.19.4, 2.20.3, 2.21.2, 2.22.3, 2.23.2, 2.24.2, 2.25.3, 2.26.1.

References

high severity

Insufficiently Protected Credentials

  • Vulnerable module: git
  • Introduced through: git@1:2.11.0-3+deb9u2 and git/git-man@1:2.11.0-3+deb9u2
  • Fixed in: 1:2.11.0-3+deb9u7

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* git@1:2.11.0-3+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* git/git-man@1:2.11.0-3+deb9u2

Overview

Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. This bug is similar to CVE-2020-5260(GHSA-qm7j-c969-7j4q). The fix for that bug still left the door open for an exploit where some credential is leaked (but the attacker cannot control which one). Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that are considered illegal as of the recently published Git versions can cause Git to send a "blank" pattern to helpers, missing hostname and protocol fields. Many helpers will interpret this as matching any URL, and will return some unspecified stored password, leaking the password to an attacker's server. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The root of the problem is in Git itself, which should not be feeding blank input to helpers. However, the ability to exploit the vulnerability in practice depends on which helpers are in use. Credential helpers which are known to trigger the vulnerability: - Git's "store" helper - Git's "cache" helper - the "osxkeychain" helper that ships in Git's "contrib" directory Credential helpers which are known to be safe even with vulnerable versions of Git: - Git Credential Manager for Windows Any helper not in this list should be assumed to trigger the vulnerability.

References

high severity

Out-of-bounds Read

  • Vulnerable module: git
  • Introduced through: git@1:2.11.0-3+deb9u2 and git/git-man@1:2.11.0-3+deb9u2
  • Fixed in: 1:2.11.0-3+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* git@1:2.11.0-3+deb9u2
  • Introduced through: circleci/node:9.0-stretch-browsers@* git/git-man@1:2.11.0-3+deb9u2

Overview

In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.

References

high severity

Incorrect Permission Assignment for Critical Resource

  • Vulnerable module: glib2.0/libglib2.0-0
  • Introduced through: glib2.0/libglib2.0-0@2.50.3-2, glib2.0/libglib2.0-bin@2.50.3-2 and others
  • Fixed in: 2.50.3-2+deb9u1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glib2.0/libglib2.0-0@2.50.3-2
  • Introduced through: circleci/node:9.0-stretch-browsers@* glib2.0/libglib2.0-bin@2.50.3-2
  • Introduced through: circleci/node:9.0-stretch-browsers@* glib2.0/libglib2.0-data@2.50.3-2
  • Introduced through: circleci/node:9.0-stretch-browsers@* glib2.0/libglib2.0-dev@2.50.3-2

Overview

The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.

References

high severity

Out-of-bounds Read

  • Vulnerable module: glib2.0/libglib2.0-0
  • Introduced through: glib2.0/libglib2.0-0@2.50.3-2, glib2.0/libglib2.0-bin@2.50.3-2 and others
  • Fixed in: 2.50.3-2+deb9u1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glib2.0/libglib2.0-0@2.50.3-2
  • Introduced through: circleci/node:9.0-stretch-browsers@* glib2.0/libglib2.0-bin@2.50.3-2
  • Introduced through: circleci/node:9.0-stretch-browsers@* glib2.0/libglib2.0-data@2.50.3-2
  • Introduced through: circleci/node:9.0-stretch-browsers@* glib2.0/libglib2.0-dev@2.50.3-2

Overview

GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().

References

high severity

Race Condition

  • Vulnerable module: glib2.0/libglib2.0-0
  • Introduced through: glib2.0/libglib2.0-0@2.50.3-2, glib2.0/libglib2.0-bin@2.50.3-2 and others
  • Fixed in: 2.50.3-2+deb9u1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glib2.0/libglib2.0-0@2.50.3-2
  • Introduced through: circleci/node:9.0-stretch-browsers@* glib2.0/libglib2.0-bin@2.50.3-2
  • Introduced through: circleci/node:9.0-stretch-browsers@* glib2.0/libglib2.0-data@2.50.3-2
  • Introduced through: circleci/node:9.0-stretch-browsers@* glib2.0/libglib2.0-dev@2.50.3-2

Overview

file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.

References

high severity

Improper Data Handling

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.

References

high severity

Missing Release of Resource after Effective Lifetime

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others
  • Fixed in: 2.24-11+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.

References

high severity

Out-of-Bounds

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others
  • Fixed in: 2.24-11+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.

References

high severity

Out-of-Bounds

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others
  • Fixed in: 2.24-11+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.

References

high severity

Out-of-Bounds

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others
  • Fixed in: 2.24-11+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.

References

high severity

Out-of-Bounds

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others
  • Fixed in: 2.24-11+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.

References

high severity

Out-of-bounds Read

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.

References

high severity

Out-of-bounds Write

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.

References

high severity

Out-of-bounds Write

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others
  • Fixed in: 2.24-11+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

References

high severity

Out-of-bounds Write

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

References

high severity

Out-of-bounds Write

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.

References

high severity

Out-of-bounds Write

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others
  • Fixed in: 2.24-11+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.

References

high severity

Out-of-bounds Write

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.

References

high severity

Untrusted Search Path

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others
  • Fixed in: 2.24-11+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.

References

high severity

Use After Free

  • Vulnerable module: glibc/libc-bin
  • Introduced through: glibc/libc-bin@2.24-11+deb9u1, glibc/libc-dev-bin@2.24-11+deb9u1 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-dev-bin@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc-l10n@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/libc6-dev@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/locales@2.24-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* glibc/multiarch-support@2.24-11+deb9u1

Overview

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.

References

high severity

Cross-site Request Forgery (CSRF)

  • Vulnerable module: gnupg2/dirmngr
  • Introduced through: gnupg2/dirmngr@2.1.18-8~deb9u1, gnupg2/gnupg@2.1.18-8~deb9u1 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* gnupg2/dirmngr@2.1.18-8~deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* gnupg2/gnupg@2.1.18-8~deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* gnupg2/gnupg-agent@2.1.18-8~deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* gnupg2/gpgv@2.1.18-8~deb9u1

Overview

GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.

References

high severity

Use of Incorrectly-Resolved Name or Reference

  • Vulnerable module: gnupg2/dirmngr
  • Introduced through: gnupg2/dirmngr@2.1.18-8~deb9u1, gnupg2/gnupg@2.1.18-8~deb9u1 and others
  • Fixed in: 2.1.18-8~deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* gnupg2/dirmngr@2.1.18-8~deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* gnupg2/gnupg@2.1.18-8~deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* gnupg2/gnupg-agent@2.1.18-8~deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* gnupg2/gpgv@2.1.18-8~deb9u1

Overview

mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.

References

high severity

Double Free

  • Vulnerable module: gnutls28/libgnutls30
  • Introduced through: gnutls28/libgnutls30@3.5.8-5+deb9u3
  • Fixed in: 3.5.8-5+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* gnutls28/libgnutls30@3.5.8-5+deb9u3

Overview

A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: graphite2/libgraphite2-3
  • Introduced through: graphite2/libgraphite2-3@1.3.10-1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* graphite2/libgraphite2-3@1.3.10-1

Overview

In libgraphite2 in graphite2 1.3.11, a NULL pointer dereference vulnerability was found in Segment.cpp during a dumbRendering operation, which may allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .ttf file.

References

high severity

Double Free

  • Vulnerable module: icu/icu-devtools
  • Introduced through: icu/icu-devtools@57.1-6, icu/libicu-dev@57.1-6 and others
  • Fixed in: 57.1-6+deb9u1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* icu/icu-devtools@57.1-6
  • Introduced through: circleci/node:9.0-stretch-browsers@* icu/libicu-dev@57.1-6
  • Introduced through: circleci/node:9.0-stretch-browsers@* icu/libicu57@57.1-6

Overview

Double free in i18n/zonemeta.cpp in International Components for Unicode (ICU) for C/C++ through 59.1 allows remote attackers to execute arbitrary code via a crafted string, aka a "redundant UVector entry clean up function call" issue.

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: icu/icu-devtools
  • Introduced through: icu/icu-devtools@57.1-6, icu/libicu-dev@57.1-6 and others
  • Fixed in: 57.1-6+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* icu/icu-devtools@57.1-6
  • Introduced through: circleci/node:9.0-stretch-browsers@* icu/libicu-dev@57.1-6
  • Introduced through: circleci/node:9.0-stretch-browsers@* icu/libicu57@57.1-6

Overview

An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.

References

high severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service.

References

high severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadSUNImage in coders/sun.c, which allows attackers to cause a denial of service.

References

high severity

Allocation of Resources Without Limits or Throttling

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadMPCImage in coders/mpc.c, which allows attackers to cause a denial of service.

References

high severity

Double Free

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

WriteEPTImage in coders/ept.c in ImageMagick 7.0.7-25 Q16 allows remote attackers to cause a denial of service (MagickCore/memory.c double free and application crash) or possibly have unspecified other impact via a crafted file.

References

high severity

Excessive Iteration

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.6-1 has a large loop vulnerability in the ReadPWPImage function in coders\pwp.c.

References

high severity

Improper Initialization

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c.

References

high severity

Improper Initialization

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c.

References

high severity

Improper Initialization

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c.

References

high severity

Information Exposure

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick before 6.9.7-6 and 7.x before 7.0.4-6, the ReadMATImage function in coders/mat.c uses uninitialized data, which might allow remote attackers to obtain sensitive information from process memory.

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound. A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-69.

Remediation

There is no fixed version for imagemagick.

References

high severity

Missing Release of Resource after Effective Lifetime

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.6-1, a memory leak vulnerability was found in the function ReadWMFImage in coders/wmf.c, which allows attackers to cause a denial of service in CloneDrawInfo in draw.c.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.7, a NULL pointer dereference vulnerability was found in the function saveBinaryCLProgram in magick/opencl.c because a program-lookup result is not checked, related to CacheOpenCLKernel.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function sixel_decode in coders/sixel.c.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function sixel_output_create in coders/sixel.c.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in ReadOneMNGImage in coders/png.c.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.7-0 has a NULL Pointer Dereference in TIFFIgnoreTags in coders/tiff.c.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

The AcquireResampleFilterThreadSet function in magick/resample-private.h in ImageMagick 7.0.7-4 mishandles failed memory allocation, which allows remote attackers to cause a denial of service (NULL Pointer Dereference in DistortImage in MagickCore/distort.c, and application crash) via unspecified vectors.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function PostscriptDelegateMessage in coders/ps.c.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In the GetOpenCLCachedFilesDirectory function in magick/opencl.c in ImageMagick 7.0.7, a NULL pointer dereference vulnerability occurs because a memory allocation result is not checked, related to GetOpenCLCacheDirectory.

References

high severity

NULL Pointer Dereference

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in PDFDelegateMessage in coders/pdf.c.

References

high severity

Out-of-Bounds

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.

References

high severity

Out-of-Bounds

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

The ReadWPGImage function in coders/wpg.c in ImageMagick 7.0.7-9 does not properly validate the colormap index in a WPG palette, which allows remote attackers to cause a denial of service (use of uninitialized data or invalid memory allocation) or possibly have unspecified other impact via a malformed WPG file.

References

high severity

Out-of-Bounds

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ReadPSDImage in coders/psd.c in ImageMagick 7.0.7-6 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to "Conditional jump or move depends on uninitialised value(s)."

References

high severity

Out-of-Bounds

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

A heap-based buffer overflow in WritePCXImage in coders/pcx.c in ImageMagick 7.0.6-8 Q16 allows remote attackers to cause a denial of service or code execution via a crafted file.

References

high severity

Out-of-Bounds

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c in ImageMagick 7.0.6-8 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.

References

high severity

Out-of-Bounds

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

GetNextToken in MagickCore/token.c in ImageMagick 7.0.6 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted SVG document, a different vulnerability than CVE-2017-10928.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u7

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u6

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the coders/psd.c ParseImageResourceBlocks function.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u6

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the MagickCore/quantum-private.h PushShortPixel function when called from the coders/psd.c ParseImageResourceBlocks function.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-26 Q16 does not properly restrict memory allocation, leading to a heap-based buffer over-read.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-21, there is a heap-based buffer over-read in ReadOneMNGImage in coders/png.c, related to length calculation and caused by an off-by-one error.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.6-1 has an out-of-bounds read vulnerability in ReadOneMNGImage in coders/png.c.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.7-4 Q16, an out of bounds read flaw related to ReadTIFFImage has been reported in coders/tiff.c. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.7-17 Q16, there is a heap-based buffer over-read in coders/sixel.c in the ReadSIXELImage function, related to the sixel_decode function.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.

References

high severity

Out-of-bounds Read

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare.

References

high severity

Out-of-bounds Write

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u11

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

Affected versions of this package are vulnerable to Out-of-bounds Write. Stack-based buffer overflow and unconditional jump in ReadXPMImage in coders/xpm.c in ImageMagick 7.0.10-7.

Remediation

Upgrade imagemagick to version or higher.

References

high severity

Out-of-bounds Write

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u7

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file.

References

high severity

Out-of-bounds Write

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.8-3 Q16, ReadBMPImage and WriteBMPImage in coders/bmp.c allow attackers to cause an out of bounds write via a crafted file.

References

high severity

Out-of-bounds Write

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.8-3 Q16, ReadDIBImage and WriteDIBImage in coders/dib.c allow attackers to cause an out of bounds write via a crafted file.

References

high severity

Out-of-bounds Write

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

The ReadMATImageV4 function in coders/mat.c in ImageMagick 7.0.8-7 uses an uninitialized variable, leading to memory corruption.

References

high severity

Out-of-bounds Write

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u8

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors.

References

high severity

Out-of-bounds Write

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u8

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.

References

high severity

Out-of-bounds Write

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u8

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error.

References

high severity

Out-of-bounds Write

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u8

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.

References

high severity

Out-of-bounds Write

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u8

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.

References

high severity

Out-of-bounds Write

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.

References

high severity

Out-of-bounds Write

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u8

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer overflow in the function WriteSGIImage of coders/sgi.c.

References

high severity

Resource Exhaustion

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service.

References

high severity

Resource Exhaustion

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u9

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.

References

high severity

Use After Free

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick before 6.9.9-24 and 7.x before 7.0.7-12 has a use-after-free in Magick::Image::read in Magick++/lib/Image.cpp.

References

high severity

Use After Free

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u8

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.

References

high severity

Use of Uninitialized Resource

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u10

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.

References

high severity

XML Injection

  • Vulnerable module: imagemagick
  • Introduced through: imagemagick@8:6.9.7.4+dfsg-11+deb9u1, imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1 and others
  • Fixed in: 8:6.9.7.4+dfsg-11+deb9u11

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6-common@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/imagemagick-6.q16@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-arch-config@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-3-extra@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickcore-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6-headers@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-3@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-6.q16-dev@8:6.9.7.4+dfsg-11+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* imagemagick/libmagickwand-dev@8:6.9.7.4+dfsg-11+deb9u1

Overview

Affected versions of this package are vulnerable to XML Injection. ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c.

Remediation

Upgrade imagemagick to version or higher.

References

high severity

Buffer Overflow

  • Vulnerable module: inetutils/inetutils-ping
  • Introduced through: inetutils/inetutils-ping@2:1.9.4-2+b1
  • Fixed in: 2:1.9.4-2+deb9u1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* inetutils/inetutils-ping@2:1.9.4-2+b1

Overview

utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.

References

high severity

Uncontrolled Recursion

  • Vulnerable module: krb5/krb5-multidev
  • Introduced through: krb5/krb5-multidev@1.15-1+deb9u1, krb5/libgssapi-krb5-2@1.15-1+deb9u1 and others
  • Fixed in: 1.15-1+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* krb5/krb5-multidev@1.15-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* krb5/libgssapi-krb5-2@1.15-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* krb5/libgssrpc4@1.15-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* krb5/libk5crypto3@1.15-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* krb5/libkadm5clnt-mit11@1.15-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* krb5/libkadm5srv-mit11@1.15-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* krb5/libkdb5-8@1.15-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* krb5/libkrb5-3@1.15-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* krb5/libkrb5-dev@1.15-1+deb9u1
  • Introduced through: circleci/node:9.0-stretch-browsers@* krb5/libkrb5support0@1.15-1+deb9u1

Overview

Affected versions of this package are vulnerable to Uncontrolled Recursion. MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.

Remediation

Upgrade krb5 to version or higher.

References

high severity

Out-of-bounds Read

  • Vulnerable module: libbsd/libbsd0
  • Introduced through: libbsd/libbsd0@0.8.3-1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libbsd/libbsd0@0.8.3-1

Overview

nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: libexif/libexif-dev
  • Introduced through: libexif/libexif-dev@0.6.21-2+b2 and libexif/libexif12@0.6.21-2+b2
  • Fixed in: 0.6.21-2+deb9u5

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif-dev@0.6.21-2+b2
  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif12@0.6.21-2+b2

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound. In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731

Remediation

Upgrade libexif to version or higher.

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: libexif/libexif-dev
  • Introduced through: libexif/libexif-dev@0.6.21-2+b2 and libexif/libexif12@0.6.21-2+b2
  • Fixed in: 0.6.21-2+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif-dev@0.6.21-2+b2
  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif12@0.6.21-2+b2

Overview

A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data).

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: libexif/libexif-dev
  • Introduced through: libexif/libexif-dev@0.6.21-2+b2 and libexif/libexif12@0.6.21-2+b2
  • Fixed in: 0.6.21-2+deb9u1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif-dev@0.6.21-2+b2
  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif12@0.6.21-2+b2

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound. In exif_data_load_data_thumbnail of exif-data.c, there is a possible denial of service due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145075076

Remediation

Upgrade libexif to version or higher.

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: libexif/libexif-dev
  • Introduced through: libexif/libexif-dev@0.6.21-2+b2 and libexif/libexif12@0.6.21-2+b2
  • Fixed in: 0.6.21-2+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif-dev@0.6.21-2+b2
  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif12@0.6.21-2+b2

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound. In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941

Remediation

Upgrade libexif to version or higher.

References

high severity

Out-of-bounds Read

  • Vulnerable module: libexif/libexif-dev
  • Introduced through: libexif/libexif-dev@0.6.21-2+b2 and libexif/libexif12@0.6.21-2+b2
  • Fixed in: 0.6.21-2+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif-dev@0.6.21-2+b2
  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif12@0.6.21-2+b2

Overview

libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data of an ExifMnote entry which can cause denial-of-service or possibly information disclosure.

References

high severity

Out-of-bounds Read

  • Vulnerable module: libexif/libexif-dev
  • Introduced through: libexif/libexif-dev@0.6.21-2+b2 and libexif/libexif12@0.6.21-2+b2
  • Fixed in: 0.6.21-2+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif-dev@0.6.21-2+b2
  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif12@0.6.21-2+b2

Overview

Affected versions of this package are vulnerable to Out-of-bounds Read. An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093.

Remediation

Upgrade libexif to version or higher.

References

high severity

Out-of-bounds Write

  • Vulnerable module: libexif/libexif-dev
  • Introduced through: libexif/libexif-dev@0.6.21-2+b2 and libexif/libexif12@0.6.21-2+b2
  • Fixed in: 0.6.21-2+deb9u1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif-dev@0.6.21-2+b2
  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif12@0.6.21-2+b2

Overview

In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112537774

References

high severity

Resource Exhaustion

  • Vulnerable module: libexif/libexif-dev
  • Introduced through: libexif/libexif-dev@0.6.21-2+b2 and libexif/libexif12@0.6.21-2+b2
  • Fixed in: 0.6.21-2+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif-dev@0.6.21-2+b2
  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif12@0.6.21-2+b2

Overview

An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to exhaust available CPU resources.

References

high severity

Resource Exhaustion

  • Vulnerable module: libexif/libexif-dev
  • Introduced through: libexif/libexif-dev@0.6.21-2+b2 and libexif/libexif12@0.6.21-2+b2
  • Fixed in: 0.6.21-2+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif-dev@0.6.21-2+b2
  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif12@0.6.21-2+b2

Overview

Affected versions of this package are vulnerable to Resource Exhaustion. An issue was discovered in libexif before 0.6.22. An unrestricted size in handling Canon EXIF MakerNote data could lead to consumption of large amounts of compute time for decoding EXIF data.

Remediation

Upgrade libexif to version or higher.

References

high severity

Use After Free

  • Vulnerable module: libexif/libexif-dev
  • Introduced through: libexif/libexif-dev@0.6.21-2+b2 and libexif/libexif12@0.6.21-2+b2
  • Fixed in: 0.6.21-2+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif-dev@0.6.21-2+b2
  • Introduced through: circleci/node:9.0-stretch-browsers@* libexif/libexif12@0.6.21-2+b2

Overview

Affected versions of this package are vulnerable to Use After Free. An issue was discovered in libexif before 0.6.22. Use of uninitialized memory in EXIF Makernote handling could lead to crashes and potential use-after-free conditions.

Remediation

Upgrade libexif to version or higher.

References

high severity

Out-of-Bounds

  • Vulnerable module: libgc/libgc1c2
  • Introduced through: libgc/libgc1c2@1:7.4.2-8

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libgc/libgc1c2@1:7.4.2-8

Overview

Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to cause client of bdwgc denial of service (heap buffer overflow crash) and possibly execute arbitrary code via huge allocation.

References

high severity

Double Free

  • Vulnerable module: libgd2/libgd3
  • Introduced through: libgd2/libgd3@2.2.4-2+deb9u2
  • Fixed in: 2.2.4-2+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libgd2/libgd3@2.2.4-2+deb9u2

Overview

The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. NOTE: PHP is unaffected.

References

high severity

Double Free

  • Vulnerable module: libgd2/libgd3
  • Introduced through: libgd2/libgd3@2.2.4-2+deb9u2
  • Fixed in: 2.2.4-2+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libgd2/libgd3@2.2.4-2+deb9u2

Overview

Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability in gdImageBmpPtr Function that can result in Remote Code Execution . This attack appear to be exploitable via Specially Crafted Jpeg Image can trigger double free. This vulnerability appears to have been fixed in after commit ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5.

References

high severity

Double Free

  • Vulnerable module: libgd2/libgd3
  • Introduced through: libgd2/libgd3@2.2.4-2+deb9u2
  • Fixed in: 2.2.4-2+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libgd2/libgd3@2.2.4-2+deb9u2

Overview

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-6978. Reason: This candidate is a reservation duplicate of CVE-2019-6978. Notes: All CVE users should reference CVE-2019-6978 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

References

high severity

Double Free

  • Vulnerable module: libgd2/libgd3
  • Introduced through: libgd2/libgd3@2.2.4-2+deb9u2
  • Fixed in: 2.2.4-2+deb9u3

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libgd2/libgd3@2.2.4-2+deb9u2

Overview

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-6978. Reason: This candidate is a reservation duplicate of CVE-2019-6978. Notes: All CVE users should reference CVE-2019-6978 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

References

high severity

Out-of-bounds Read

  • Vulnerable module: libgd2/libgd3
  • Introduced through: libgd2/libgd3@2.2.4-2+deb9u2

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libgd2/libgd3@2.2.4-2+deb9u2

Overview

** DISPUTED ** In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says "In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.'"

References

high severity

Out-of-bounds Write

  • Vulnerable module: libgd2/libgd3
  • Introduced through: libgd2/libgd3@2.2.4-2+deb9u2
  • Fixed in: 2.2.4-2+deb9u4

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libgd2/libgd3@2.2.4-2+deb9u2

Overview

gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.

References

high severity

Integer Overflow or Wraparound

  • Vulnerable module: libidn/libidn11
  • Introduced through: libidn/libidn11@1.33-1
  • Fixed in: 1.33-1+deb9u1

Detailed paths

  • Introduced through: circleci/node:9.0-stretch-browsers@* libidn/libidn11@1.33-1

Overview

Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.

References

high severity

Out-of-bounds Read

  • Vulnerable module: libjpeg-turbo/libjpeg-dev
  • Introduced through: libjpeg-turbo/libjpeg-dev@1:1.5.1-2, libjpeg-turbo/libjpeg62-turbo@1:1.5.1-2 and others
  • Fixed in: 1:1.5.1-2+deb9u1

Detailed paths