An update for ImageMagick is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2023-1259 Final 1.0 1.0 2023-04-28 Initial 2023-04-28 2023-04-28 openEuler SA Tool V1.0 2023-04-28 ImageMagick security update An update for ImageMagick is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1. Use ImageMagick to create, edit, compose, or convert bitmap images. It can read and write images in a variety of formats (over 200) including PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR, WebP, Postscript, PDF, and SVG. Use ImageMagick to resize, flip, mirror, rotate, distort, shear and transform images, adjust image colors, apply various special effects, or draw text, lines, polygons, ellipses and Bézier curves. Security Fix(es): A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.(CVE-2023-1289) A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.(CVE-2023-1906) An update for ImageMagick is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium ImageMagick https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1259 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-1289 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-1906 https://nvd.nist.gov/vuln/detail/CVE-2023-1289 https://nvd.nist.gov/vuln/detail/CVE-2023-1906 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 ImageMagick-debugsource-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-c++-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-perl-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-c++-devel-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-debuginfo-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-devel-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-help-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-devel-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-debuginfo-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-debugsource-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-perl-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-c++-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-c++-devel-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-help-6.9.12.86-1.oe1.aarch64.rpm ImageMagick-help-7.1.1.8-1.oe2203.aarch64.rpm ImageMagick-debuginfo-7.1.1.8-1.oe2203.aarch64.rpm ImageMagick-devel-7.1.1.8-1.oe2203.aarch64.rpm ImageMagick-debugsource-7.1.1.8-1.oe2203.aarch64.rpm ImageMagick-c++-7.1.1.8-1.oe2203.aarch64.rpm ImageMagick-c++-devel-7.1.1.8-1.oe2203.aarch64.rpm ImageMagick-perl-7.1.1.8-1.oe2203.aarch64.rpm ImageMagick-7.1.1.8-1.oe2203.aarch64.rpm ImageMagick-perl-7.1.1.8-1.oe2203sp1.aarch64.rpm ImageMagick-debugsource-7.1.1.8-1.oe2203sp1.aarch64.rpm ImageMagick-debuginfo-7.1.1.8-1.oe2203sp1.aarch64.rpm ImageMagick-devel-7.1.1.8-1.oe2203sp1.aarch64.rpm ImageMagick-help-7.1.1.8-1.oe2203sp1.aarch64.rpm ImageMagick-c++-7.1.1.8-1.oe2203sp1.aarch64.rpm ImageMagick-c++-devel-7.1.1.8-1.oe2203sp1.aarch64.rpm ImageMagick-7.1.1.8-1.oe2203sp1.aarch64.rpm ImageMagick-6.9.12.86-1.oe1.src.rpm ImageMagick-6.9.12.86-1.oe1.src.rpm ImageMagick-7.1.1.8-1.oe2203.src.rpm ImageMagick-7.1.1.8-1.oe2203sp1.src.rpm ImageMagick-help-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-devel-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-debugsource-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-c++-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-perl-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-c++-devel-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-debuginfo-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-debugsource-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-devel-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-perl-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-help-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-c++-devel-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-debuginfo-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-c++-6.9.12.86-1.oe1.x86_64.rpm ImageMagick-devel-7.1.1.8-1.oe2203.x86_64.rpm ImageMagick-7.1.1.8-1.oe2203.x86_64.rpm ImageMagick-help-7.1.1.8-1.oe2203.x86_64.rpm ImageMagick-c++-7.1.1.8-1.oe2203.x86_64.rpm ImageMagick-debuginfo-7.1.1.8-1.oe2203.x86_64.rpm ImageMagick-c++-devel-7.1.1.8-1.oe2203.x86_64.rpm ImageMagick-perl-7.1.1.8-1.oe2203.x86_64.rpm ImageMagick-debugsource-7.1.1.8-1.oe2203.x86_64.rpm ImageMagick-c++-devel-7.1.1.8-1.oe2203sp1.x86_64.rpm ImageMagick-help-7.1.1.8-1.oe2203sp1.x86_64.rpm ImageMagick-debugsource-7.1.1.8-1.oe2203sp1.x86_64.rpm ImageMagick-perl-7.1.1.8-1.oe2203sp1.x86_64.rpm ImageMagick-devel-7.1.1.8-1.oe2203sp1.x86_64.rpm ImageMagick-7.1.1.8-1.oe2203sp1.x86_64.rpm ImageMagick-c++-7.1.1.8-1.oe2203sp1.x86_64.rpm ImageMagick-debuginfo-7.1.1.8-1.oe2203sp1.x86_64.rpm A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in /tmp, resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G. 2023-04-28 CVE-2023-1289 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 Medium 5.5 AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H ImageMagick security update 2023-04-28 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1259 A heap-based buffer overflow issue was discovered in ImageMagick s ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service. 2023-04-28 CVE-2023-1906 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 Medium 5.5 AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H ImageMagick security update 2023-04-28 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1259