An update for ImageMagick is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-1903 Final 1.0 1.0 2022-09-09 Initial 2022-09-09 2022-09-09 openEuler SA Tool V1.0 2022-09-09 ImageMagick security update An update for ImageMagick is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. Use ImageMagick to create, edit, compose, or convert bitmap images. It can read and write images in a variety of formats (over 200) including PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR, WebP, Postscript, PDF, and SVG. Use ImageMagick to resize, flip, mirror, rotate, distort,shear and transform images, adjust image colors, apply various special effects,or draw text, lines, polygons, ellipses and Bézier curves. Security Fix(es): A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.(CVE-2022-1115) An update for ImageMagick is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium ImageMagick https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1903 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-1115 https://nvd.nist.gov/vuln/detail/CVE-2022-1115 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS ImageMagick-c++-devel-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-debuginfo-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-perl-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-c++-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-debugsource-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-devel-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-help-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-debugsource-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-c++-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-perl-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-debuginfo-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-help-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-c++-devel-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-devel-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-6.9.12.43-2.oe1.aarch64.rpm ImageMagick-perl-7.1.0.28-3.oe2203.aarch64.rpm ImageMagick-devel-7.1.0.28-3.oe2203.aarch64.rpm ImageMagick-help-7.1.0.28-3.oe2203.aarch64.rpm ImageMagick-c++-devel-7.1.0.28-3.oe2203.aarch64.rpm ImageMagick-debuginfo-7.1.0.28-3.oe2203.aarch64.rpm ImageMagick-debugsource-7.1.0.28-3.oe2203.aarch64.rpm ImageMagick-7.1.0.28-3.oe2203.aarch64.rpm ImageMagick-c++-7.1.0.28-3.oe2203.aarch64.rpm ImageMagick-6.9.12.43-2.oe1.src.rpm ImageMagick-6.9.12.43-2.oe1.src.rpm ImageMagick-7.1.0.28-3.oe2203.src.rpm ImageMagick-c++-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-debuginfo-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-help-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-devel-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-debugsource-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-c++-devel-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-perl-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-debugsource-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-c++-devel-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-c++-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-perl-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-help-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-debuginfo-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-devel-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-6.9.12.43-2.oe1.x86_64.rpm ImageMagick-7.1.0.28-3.oe2203.x86_64.rpm ImageMagick-help-7.1.0.28-3.oe2203.x86_64.rpm ImageMagick-c++-devel-7.1.0.28-3.oe2203.x86_64.rpm ImageMagick-debugsource-7.1.0.28-3.oe2203.x86_64.rpm ImageMagick-debuginfo-7.1.0.28-3.oe2203.x86_64.rpm ImageMagick-c++-7.1.0.28-3.oe2203.x86_64.rpm ImageMagick-devel-7.1.0.28-3.oe2203.x86_64.rpm ImageMagick-perl-7.1.0.28-3.oe2203.x86_64.rpm A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service. 2022-09-09 CVE-2022-1115 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS Medium 5.5 AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H ImageMagick security update 2022-09-09 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1903