Bug 13863

Summary: [CVE 21] imagemagick 7.1.0.30 CVEs found
Product: [ROSA-based products] ROSA Fresh Reporter: Yury <y.tumanov>
Component: System (kernel, glibc, systemd, bash, PAM...)Assignee: ROSA Linux Bugs <bugs>
Status: VERIFIED FIXED QA Contact: ROSA Linux Bugs <bugs>
Severity: blocker    
Priority: Highest CC: a.proklov, e.kosachev, s.matveev, v.potapov, victorr2007, y.tumanov
Version: AllFlags: v.potapov: qa_verified+
y.tumanov: secteam_verified+
a.proklov: published+
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: CVE-2022-1114, CVE-2022-1115, CVE-2022-32545, CVE-2022-32546, CVE-2023-1289, CVE-2023-2157, CVE-2023-34151, CVE-2023-34152, CVE-2023-34153, CVE-2023-3428, CVE-2023-34474, CVE-2023-34475, CVE-2023-3745,
Whiteboard:
Platform: 2021.1 ROSA Vulnerability identifier:
RPM Package: ISO-related:
Bad POT generating: Upstream:

Description Yury 2023-10-18 20:26:37 MSK
Please patch CVEs for package imagemagick version 7.1.0.30
  
INFO (CVEs are): imagemagick 7.1.0.30
 cves found
CVE-2022-1114
Desc: A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-1114
Severity: HIGH
CVE-2022-1115
Desc: A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-1115
Severity: MEDIUM
CVE-2022-32545
Desc: A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-32545
Severity: HIGH
CVE-2022-32546
Desc: A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-32546
Severity: HIGH
CVE-2023-1289
Desc: A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-1289
Severity: MEDIUM
CVE-2023-2157
Desc: A heap-based buffer overflow vulnerability was found in the ImageMagick package that can lead to the application crashing.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-2157
Severity: MEDIUM
CVE-2023-34151
Desc: A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546).
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-34151
Severity: MEDIUM
CVE-2023-34152
Desc: A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-34152
Severity: CRITICAL
CVE-2023-34153
Desc: A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-34153
Severity: HIGH
CVE-2023-3428
Desc: A heap-based buffer overflow vulnerability was found  in coders/tiff.c in ImageMagick. This issue may allow a local attacker to trick the user into opening a specially crafted file, resulting in an application crash and denial of service.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-3428
Severity: MEDIUM
CVE-2023-34474
Desc: A heap-based buffer overflow issue was discovered in ImageMagick's ReadTIM2ImageData() function in coders/tim2.c. A local attacker could trick the user in opening specially crafted file, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-34474
Severity: MEDIUM
CVE-2023-34475
Desc: A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-34475
Severity: MEDIUM
CVE-2023-3745
Desc: A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-3745
Severity: MEDIUM
Comment 2 Vladimir Potapov 2023-10-21 09:53:24 MSK
(In reply to VictorR2007 from comment #1)
> Обновлено версии 7.1.1.8
> 
> Сборки 
> https://abf.rosalinux.ru/build_lists/4759200
> https://abf.rosalinux.ru/build_lists/4759201
> https://abf.rosalinux.ru/build_lists/4759202
> https://abf.rosalinux.ru/build_lists/4759203
> https://abf.rosalinux.ru/build_lists/4759204

Гм, но ведь критическая уязвимость требует поднятия до выше чем 7.1.1.11?
https://nvd.nist.gov/vuln/detail/CVE-2023-34152
Comment 3 VictorR2007 2023-10-22 05:33:51 MSK
(In reply to Vladimir Potapov from comment #2)
> Гм, но ведь критическая уязвимость требует поднятия до выше чем 7.1.1.11?
> https://nvd.nist.gov/vuln/detail/CVE-2023-34152

Извиняюсь.

Новые сборки.
https://abf.rosalinux.ru/build_lists/4760026
https://abf.rosalinux.ru/build_lists/4760027
https://abf.rosalinux.ru/build_lists/4760028
https://abf.rosalinux.ru/build_lists/4760029
https://abf.rosalinux.ru/build_lists/4760030
Comment 4 VictorR2007 2023-10-22 13:44:22 MSK
Update version to 7.1.1.21

Сегодня вышло ещё одно исправление.
Заодно и сюда обновил.

Сборки 7.1.1.21
https://abf.rosalinux.ru/build_lists/4760050
https://abf.rosalinux.ru/build_lists/4760051
https://abf.rosalinux.ru/build_lists/4760052
https://abf.rosalinux.ru/build_lists/4760053
https://abf.rosalinux.ru/build_lists/4760054
Comment 5 Dmitry Postnikov 2023-10-22 21:10:43 MSK
*** Bug 13731 has been marked as a duplicate of this bug. ***
Comment 6 Dmitry Postnikov 2023-10-22 21:12:09 MSK
*** Bug 13541 has been marked as a duplicate of this bug. ***
Comment 8 Vladimir Potapov 2023-10-23 16:05:04 MSK
*** Bug 13243 has been marked as a duplicate of this bug. ***
Comment 9 Vladimir Potapov 2023-10-24 13:03:08 MSK
imagemagick-7.1.1.21-1
https://abf.rosalinux.ru/build_lists/4760050
https://abf.rosalinux.ru/build_lists/4760051
https://abf.rosalinux.ru/build_lists/4760052
https://abf.rosalinux.ru/build_lists/4760053
https://abf.rosalinux.ru/build_lists/4760054
******************************* Advisory ************************
CVE fixed by version update
*****************************************************************
QA Verified
Comment 10 Yury 2023-10-27 19:56:29 MSK
secteam_verified