An update for ImageMagick is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1259
Final
1.0
1.0
2023-04-28
Initial
2023-04-28
2023-04-28
openEuler SA Tool V1.0
2023-04-28
ImageMagick security update
An update for ImageMagick is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.
Use ImageMagick to create, edit, compose, or convert bitmap images. It can read and write images in a variety of formats (over 200) including PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR, WebP, Postscript, PDF, and SVG. Use ImageMagick to resize, flip, mirror, rotate, distort, shear and transform images, adjust image colors, apply various special effects, or draw text, lines, polygons, ellipses and Bézier curves.
Security Fix(es):
A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.(CVE-2023-1289)
A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.(CVE-2023-1906)
An update for ImageMagick is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
ImageMagick
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1259
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-1289
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-1906
https://nvd.nist.gov/vuln/detail/CVE-2023-1289
https://nvd.nist.gov/vuln/detail/CVE-2023-1906
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
ImageMagick-debugsource-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-c++-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-perl-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-c++-devel-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-debuginfo-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-devel-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-help-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-devel-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-debuginfo-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-debugsource-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-perl-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-c++-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-c++-devel-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-help-6.9.12.86-1.oe1.aarch64.rpm
ImageMagick-help-7.1.1.8-1.oe2203.aarch64.rpm
ImageMagick-debuginfo-7.1.1.8-1.oe2203.aarch64.rpm
ImageMagick-devel-7.1.1.8-1.oe2203.aarch64.rpm
ImageMagick-debugsource-7.1.1.8-1.oe2203.aarch64.rpm
ImageMagick-c++-7.1.1.8-1.oe2203.aarch64.rpm
ImageMagick-c++-devel-7.1.1.8-1.oe2203.aarch64.rpm
ImageMagick-perl-7.1.1.8-1.oe2203.aarch64.rpm
ImageMagick-7.1.1.8-1.oe2203.aarch64.rpm
ImageMagick-perl-7.1.1.8-1.oe2203sp1.aarch64.rpm
ImageMagick-debugsource-7.1.1.8-1.oe2203sp1.aarch64.rpm
ImageMagick-debuginfo-7.1.1.8-1.oe2203sp1.aarch64.rpm
ImageMagick-devel-7.1.1.8-1.oe2203sp1.aarch64.rpm
ImageMagick-help-7.1.1.8-1.oe2203sp1.aarch64.rpm
ImageMagick-c++-7.1.1.8-1.oe2203sp1.aarch64.rpm
ImageMagick-c++-devel-7.1.1.8-1.oe2203sp1.aarch64.rpm
ImageMagick-7.1.1.8-1.oe2203sp1.aarch64.rpm
ImageMagick-6.9.12.86-1.oe1.src.rpm
ImageMagick-6.9.12.86-1.oe1.src.rpm
ImageMagick-7.1.1.8-1.oe2203.src.rpm
ImageMagick-7.1.1.8-1.oe2203sp1.src.rpm
ImageMagick-help-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-devel-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-debugsource-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-c++-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-perl-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-c++-devel-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-debuginfo-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-debugsource-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-devel-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-perl-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-help-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-c++-devel-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-debuginfo-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-c++-6.9.12.86-1.oe1.x86_64.rpm
ImageMagick-devel-7.1.1.8-1.oe2203.x86_64.rpm
ImageMagick-7.1.1.8-1.oe2203.x86_64.rpm
ImageMagick-help-7.1.1.8-1.oe2203.x86_64.rpm
ImageMagick-c++-7.1.1.8-1.oe2203.x86_64.rpm
ImageMagick-debuginfo-7.1.1.8-1.oe2203.x86_64.rpm
ImageMagick-c++-devel-7.1.1.8-1.oe2203.x86_64.rpm
ImageMagick-perl-7.1.1.8-1.oe2203.x86_64.rpm
ImageMagick-debugsource-7.1.1.8-1.oe2203.x86_64.rpm
ImageMagick-c++-devel-7.1.1.8-1.oe2203sp1.x86_64.rpm
ImageMagick-help-7.1.1.8-1.oe2203sp1.x86_64.rpm
ImageMagick-debugsource-7.1.1.8-1.oe2203sp1.x86_64.rpm
ImageMagick-perl-7.1.1.8-1.oe2203sp1.x86_64.rpm
ImageMagick-devel-7.1.1.8-1.oe2203sp1.x86_64.rpm
ImageMagick-7.1.1.8-1.oe2203sp1.x86_64.rpm
ImageMagick-c++-7.1.1.8-1.oe2203sp1.x86_64.rpm
ImageMagick-debuginfo-7.1.1.8-1.oe2203sp1.x86_64.rpm
A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in /tmp, resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
2023-04-28
CVE-2023-1289
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
Medium
5.5
AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
ImageMagick security update
2023-04-28
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1259
A heap-based buffer overflow issue was discovered in ImageMagick s ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
2023-04-28
CVE-2023-1906
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
Medium
5.5
AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
ImageMagick security update
2023-04-28
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1259