An update for ImageMagick is now available for openEuler-20.03-LTS-SP3 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2023-1406 Final 1.0 1.0 2023-07-08 Initial 2023-07-08 2023-07-08 openEuler SA Tool V1.0 2023-07-08 ImageMagick security update An update for ImageMagick is now available for openEuler-20.03-LTS-SP3. Use ImageMagick to create, edit, compose, or convert bitmap images. It can read and write images in a variety of formats (over 200) including PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR, WebP, Postscript, PDF, and SVG. Use ImageMagick to resize, flip, mirror, rotate, distort, shear and transform images, adjust image colors, apply various special effects, or draw text, lines, polygons, ellipses and Bézier curves. Security Fix(es): A stack-based buffer overflow issue was found in ImageMagick's coders/tiff.c. This flaw allows an attacker to trick the user into opening a specially crafted malicious tiff file, causing an application to crash, resulting in a denial of service.(CVE-2023-3195) An update for ImageMagick is now available for openEuler-20.03-LTS-SP3. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium ImageMagick https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1406 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-3195 https://nvd.nist.gov/vuln/detail/CVE-2023-3195 openEuler-20.03-LTS-SP3 ImageMagick-c++-6.9.12.86-2.oe1.aarch64.rpm ImageMagick-debuginfo-6.9.12.86-2.oe1.aarch64.rpm ImageMagick-perl-6.9.12.86-2.oe1.aarch64.rpm ImageMagick-debugsource-6.9.12.86-2.oe1.aarch64.rpm ImageMagick-c++-devel-6.9.12.86-2.oe1.aarch64.rpm ImageMagick-help-6.9.12.86-2.oe1.aarch64.rpm ImageMagick-devel-6.9.12.86-2.oe1.aarch64.rpm ImageMagick-6.9.12.86-2.oe1.aarch64.rpm ImageMagick-6.9.12.86-2.oe1.src.rpm ImageMagick-c++-6.9.12.86-2.oe1.x86_64.rpm ImageMagick-help-6.9.12.86-2.oe1.x86_64.rpm ImageMagick-debugsource-6.9.12.86-2.oe1.x86_64.rpm ImageMagick-devel-6.9.12.86-2.oe1.x86_64.rpm ImageMagick-perl-6.9.12.86-2.oe1.x86_64.rpm ImageMagick-c++-devel-6.9.12.86-2.oe1.x86_64.rpm ImageMagick-debuginfo-6.9.12.86-2.oe1.x86_64.rpm ImageMagick-6.9.12.86-2.oe1.x86_64.rpm A stack-based buffer overflow issue was found in ImageMagick s coders/tiff.c. This flaw allows an attacker to trick the user into opening a specially crafted malicious tiff file, causing an application to crash, resulting in a denial of service. 2023-07-08 CVE-2023-3195 openEuler-20.03-LTS-SP3 Medium 5.5 AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H ImageMagick security update 2023-07-08 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1406