Bug 13731

Summary: [CVE 21] imagemagick 7.1.0.30 CVEs found
Product: [ROSA-based products] ROSA Fresh Reporter: Yury <y.tumanov>
Component: System (kernel, glibc, systemd, bash, PAM...)Assignee: ROSA Linux Bugs <bugs>
Status: RESOLVED DUPLICATE QA Contact: ROSA Linux Bugs <bugs>
Severity: normal    
Priority: Normal CC: e.kosachev, pastordidi, s.matveev, victorr2007, y.tumanov
Version: AllFlags: pastordidi: qa_verified-
pastordidi: secteam_verified-
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: CVE-2022-1114, CVE-2022-1115, CVE-2022-32545, CVE-2022-32546, CVE-2023-1289, CVE-2023-2157, CVE-2023-34151, CVE-2023-34152, CVE-2023-34153, CVE-2023-3428, CVE-2023-34474, CVE-2023-34475, CVE-2023-3745,
Whiteboard:
Platform: 2021.1 ROSA Vulnerability identifier:
RPM Package: ISO-related:
Bad POT generating: Upstream:

Description Yury 2023-10-18 20:01:53 MSK
Please patch CVEs for package imagemagick version 7.1.0.30
  
INFO (CVEs are): imagemagick 7.1.0.30
 cves found
CVE-2022-1114
Desc: A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-1114
Severity: HIGH
CVE-2022-1115
Desc: A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-1115
Severity: MEDIUM
CVE-2022-32545
Desc: A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-32545
Severity: HIGH
CVE-2022-32546
Desc: A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-32546
Severity: HIGH
CVE-2023-1289
Desc: A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-1289
Severity: MEDIUM
CVE-2023-2157
Desc: A heap-based buffer overflow vulnerability was found in the ImageMagick package that can lead to the application crashing.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-2157
Severity: MEDIUM
CVE-2023-34151
Desc: A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546).
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-34151
Severity: MEDIUM
CVE-2023-34152
Desc: A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-34152
Severity: CRITICAL
CVE-2023-34153
Desc: A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-34153
Severity: HIGH
CVE-2023-3428
Desc: A heap-based buffer overflow vulnerability was found  in coders/tiff.c in ImageMagick. This issue may allow a local attacker to trick the user into opening a specially crafted file, resulting in an application crash and denial of service.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-3428
Severity: MEDIUM
CVE-2023-34474
Desc: A heap-based buffer overflow issue was discovered in ImageMagick's ReadTIM2ImageData() function in coders/tim2.c. A local attacker could trick the user in opening specially crafted file, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-34474
Severity: MEDIUM
CVE-2023-34475
Desc: A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-34475
Severity: MEDIUM
CVE-2023-3745
Desc: A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-3745
Severity: MEDIUM
Comment 1 VictorR2007 2023-10-20 13:25:31 MSK
Обновлено до версии 7.1.1.8 в этом баге

https://bugzilla.rosalinux.ru/show_bug.cgi?id=13863
Comment 2 Dmitry Postnikov 2023-10-22 21:10:43 MSK

*** This bug has been marked as a duplicate of bug 13863 ***