An update for ImageMagick is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1065
Final
1.0
1.0
2023-02-10
Initial
2023-02-10
2023-02-10
openEuler SA Tool V1.0
2023-02-10
ImageMagick security update
An update for ImageMagick is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.
Use ImageMagick to create, edit, compose, or convert bitmap images. It can read and write images in a variety of formats (over 200) including PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR,WebP, Postscript, PDF, and SVG. Use ImageMagick to resize, flip, mirror, rotate, distort,shear and transform images, adjust image colors, apply various special effects,or draw text, lines, polygons, ellipses and Bézier curves.
Security Fix(es):
ImageMagick 7.1.0-49 is vulnerable to Denial of Service. When it parses a PNG image (e.g., for resize), the convert process could be left waiting for stdin input.(CVE-2022-44267)
ImageMagick 7.1.0-49 is vulnerable to Information Disclosure. When it parses a PNG image (e.g., for resize), the resulting image could have embedded the content of an arbitrary. file (if the magick binary has permissions to read it).(CVE-2022-44268)
An update for ImageMagick is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
ImageMagick
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1065
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-44267
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-44268
https://nvd.nist.gov/vuln/detail/CVE-2022-44267
https://nvd.nist.gov/vuln/detail/CVE-2022-44268
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
ImageMagick-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-c++-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-c++-devel-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-perl-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-devel-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-debuginfo-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-debugsource-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-help-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-c++-devel-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-debuginfo-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-debugsource-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-perl-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-help-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-devel-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-c++-6.9.12.43-5.oe1.aarch64.rpm
ImageMagick-c++-7.1.0.28-6.oe2203.aarch64.rpm
ImageMagick-7.1.0.28-6.oe2203.aarch64.rpm
ImageMagick-perl-7.1.0.28-6.oe2203.aarch64.rpm
ImageMagick-debugsource-7.1.0.28-6.oe2203.aarch64.rpm
ImageMagick-c++-devel-7.1.0.28-6.oe2203.aarch64.rpm
ImageMagick-devel-7.1.0.28-6.oe2203.aarch64.rpm
ImageMagick-help-7.1.0.28-6.oe2203.aarch64.rpm
ImageMagick-debuginfo-7.1.0.28-6.oe2203.aarch64.rpm
ImageMagick-c++-7.1.0.28-6.oe2203sp1.aarch64.rpm
ImageMagick-debugsource-7.1.0.28-6.oe2203sp1.aarch64.rpm
ImageMagick-7.1.0.28-6.oe2203sp1.aarch64.rpm
ImageMagick-perl-7.1.0.28-6.oe2203sp1.aarch64.rpm
ImageMagick-debuginfo-7.1.0.28-6.oe2203sp1.aarch64.rpm
ImageMagick-devel-7.1.0.28-6.oe2203sp1.aarch64.rpm
ImageMagick-help-7.1.0.28-6.oe2203sp1.aarch64.rpm
ImageMagick-c++-devel-7.1.0.28-6.oe2203sp1.aarch64.rpm
ImageMagick-6.9.12.43-5.oe1.src.rpm
ImageMagick-6.9.12.43-5.oe1.src.rpm
ImageMagick-7.1.0.28-6.oe2203.src.rpm
ImageMagick-7.1.0.28-6.oe2203sp1.src.rpm
ImageMagick-c++-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-perl-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-debuginfo-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-c++-devel-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-debugsource-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-help-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-devel-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-c++-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-debuginfo-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-help-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-devel-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-perl-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-c++-devel-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-debugsource-6.9.12.43-5.oe1.x86_64.rpm
ImageMagick-c++-devel-7.1.0.28-6.oe2203.x86_64.rpm
ImageMagick-debuginfo-7.1.0.28-6.oe2203.x86_64.rpm
ImageMagick-c++-7.1.0.28-6.oe2203.x86_64.rpm
ImageMagick-perl-7.1.0.28-6.oe2203.x86_64.rpm
ImageMagick-devel-7.1.0.28-6.oe2203.x86_64.rpm
ImageMagick-help-7.1.0.28-6.oe2203.x86_64.rpm
ImageMagick-debugsource-7.1.0.28-6.oe2203.x86_64.rpm
ImageMagick-7.1.0.28-6.oe2203.x86_64.rpm
ImageMagick-c++-devel-7.1.0.28-6.oe2203sp1.x86_64.rpm
ImageMagick-7.1.0.28-6.oe2203sp1.x86_64.rpm
ImageMagick-c++-7.1.0.28-6.oe2203sp1.x86_64.rpm
ImageMagick-perl-7.1.0.28-6.oe2203sp1.x86_64.rpm
ImageMagick-debugsource-7.1.0.28-6.oe2203sp1.x86_64.rpm
ImageMagick-debuginfo-7.1.0.28-6.oe2203sp1.x86_64.rpm
ImageMagick-devel-7.1.0.28-6.oe2203sp1.x86_64.rpm
ImageMagick-help-7.1.0.28-6.oe2203sp1.x86_64.rpm
ImageMagick 7.1.0-49 is vulnerable to Denial of Service. When it parses a PNG image (e.g., for resize), the convert process could be left waiting for stdin input.
2023-02-10
CVE-2022-44267
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
ImageMagick security update
2023-02-10
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1065
ImageMagick 7.1.0-49 is vulnerable to Information Disclosure. When it parses a PNG image (e.g., for resize), the resulting image could have embedded the content of an arbitrary. file (if the magick binary has permissions to read it).
2023-02-10
CVE-2022-44268
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
ImageMagick security update
2023-02-10
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1065