Bugzilla – Bug 1171271
VUL-0: CVE-2020-12672: GraphicsMagick: heap-based buffer overflow in ReadMNGImage in coders/png.c.
Last modified: 2020-07-03 15:49:10 UTC
CVE-2020-12672 GraphicsMagick through 1.3.35 has a heap-based buffer overflow in ReadMNGImage in coders/png.c. References: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19025 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-12672 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12672
Hmm, are you able to reproduce? With TW/1.3.35 I get SIGABRT only. No valgrind or asan report. Perhaps something under 'detailed report', dunno.
I have sent a mail to upstream.
Using 16291:50395430a371. Submitted for TW,15/GraphicsMagick.
This is an autogenerated message for OBS integration: This bug (1171271) was mentioned in https://build.opensuse.org/request/show/810842 Factory / GraphicsMagick https://build.opensuse.org/request/show/810846 15.1 / GraphicsMagick
openSUSE-SU-2020:0779-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1171271 CVE References: CVE-2020-12672 Sources used: openSUSE Leap 15.1 (src): GraphicsMagick-1.3.29-lp151.4.20.1
openSUSE-SU-2020:0788-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1171271 CVE References: CVE-2020-12672 Sources used: openSUSE Backports SLE-15-SP1 (src): GraphicsMagick-1.3.29-bp151.5.15.1
released