An update for ImageMagick is now available for openEuler-22.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1409
Final
1.0
1.0
2023-07-08
Initial
2023-07-08
2023-07-08
openEuler SA Tool V1.0
2023-07-08
ImageMagick security update
An update for ImageMagick is now available for openEuler-22.03-LTS-SP2.
Use ImageMagick to create, edit, compose, or convert bitmap images. It can read and write images in a variety of formats (over 200) including PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR, WebP, Postscript, PDF, and SVG. Use ImageMagick to resize, flip, mirror, rotate, distort, shear and transform images, adjust image colors, apply various special effects, or draw text, lines, polygons, ellipses and Bézier curves.
Security Fix(es):
A heap-based buffer overflow issue was discovered in ImageMagick's ReadTIM2ImageData() function in coders/tim2.c. A local attacker could trick the user in opening specially crafted file, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.(CVE-2023-34474)
A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service.(CVE-2023-34475)
An update for ImageMagick is now available for openEuler-22.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
ImageMagick
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1409
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-34474
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-34475
https://nvd.nist.gov/vuln/detail/CVE-2023-34474
https://nvd.nist.gov/vuln/detail/CVE-2023-34475
openEuler-22.03-LTS-SP2
ImageMagick-c++-devel-7.1.1.8-3.oe2203sp2.aarch64.rpm
ImageMagick-debugsource-7.1.1.8-3.oe2203sp2.aarch64.rpm
ImageMagick-devel-7.1.1.8-3.oe2203sp2.aarch64.rpm
ImageMagick-c++-7.1.1.8-3.oe2203sp2.aarch64.rpm
ImageMagick-debuginfo-7.1.1.8-3.oe2203sp2.aarch64.rpm
ImageMagick-7.1.1.8-3.oe2203sp2.aarch64.rpm
ImageMagick-perl-7.1.1.8-3.oe2203sp2.aarch64.rpm
ImageMagick-help-7.1.1.8-3.oe2203sp2.aarch64.rpm
ImageMagick-7.1.1.8-3.oe2203sp2.src.rpm
ImageMagick-debuginfo-7.1.1.8-3.oe2203sp2.x86_64.rpm
ImageMagick-7.1.1.8-3.oe2203sp2.x86_64.rpm
ImageMagick-perl-7.1.1.8-3.oe2203sp2.x86_64.rpm
ImageMagick-c++-7.1.1.8-3.oe2203sp2.x86_64.rpm
ImageMagick-devel-7.1.1.8-3.oe2203sp2.x86_64.rpm
ImageMagick-help-7.1.1.8-3.oe2203sp2.x86_64.rpm
ImageMagick-c++-devel-7.1.1.8-3.oe2203sp2.x86_64.rpm
ImageMagick-debugsource-7.1.1.8-3.oe2203sp2.x86_64.rpm
A heap-based buffer overflow issue was discovered in ImageMagick s ReadTIM2ImageData() function in coders/tim2.c. A local attacker could trick the user in opening specially crafted file, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
2023-07-08
CVE-2023-34474
openEuler-22.03-LTS-SP2
Medium
5.5
AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
ImageMagick security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1409
A heap use after free issue was discovered in ImageMagick s ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service.
2023-07-08
CVE-2023-34475
openEuler-22.03-LTS-SP2
Medium
5.5
AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
ImageMagick security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1409