GraphicsMagick 1.3.26 is vulnerable to a memory information disclosure
vulnerability found in the DescribeImage function of the magick/describe.c
file, because of a heap-based buffer over-read. The portion of the code
containing the vulnerability is responsible for printing the IPTC Profile
information contained in the image. This vulnerability can be triggered
with a specially crafted MIFF file. There is an out-of-bounds buffer
dereference because certain increments are never checked.
It was discovered that GraphicsMagick incorrectly handled certain image
files. An attacker could possibly use this issue to cause a denial of
service or other unspecified impact.
Upstream:released (1.3.26-17)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):released (1.3.23-1ubuntu0.4)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.3.26-17)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (1.3.26-17)
Ubuntu 20.10 (Groovy Gorilla):not-affected (1.3.26-17)
More Information

Updated: 2020-09-09 21:28:34 UTC (commit b67d7d8b03f173f825cd706df5bd078bca500b0e)