https://bugzilla.redhat.com/show_bug.cgi?id=2067022
Bug ID: 2067022 Summary: ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h Product: Security Response Hardware: All OS: Linux Status: NEW Component: vulnerability Keywords: Security Severity: medium Priority: medium Assignee: security-response-team@redhat.com Reporter: trathi@redhat.com CC: blaise@gmail.com, dcavalca@fb.com, epel-packagers-sig@lists.fedoraproject.org, fedora@famillecollet.com, jhorak@redhat.com, luya_tfz@thefinalzone.net, michel@michel-slm.name, ngompa13@gmail.com, pampelmuse@gmx.at, sergio@serjux.com, troy@troycurtisjr.com Target Milestone: --- Classification: Other
A heap-buffer-overflow flaw was found in PushShortPixel function of quantum-private.h
References: https://github.com/ImageMagick/ImageMagick/issues/4974
https://bugzilla.redhat.com/show_bug.cgi?id=2067022
TEJ RATHI trathi@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Blocks| |2064539
https://bugzilla.redhat.com/show_bug.cgi?id=2067022
TEJ RATHI trathi@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |2067098
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2067098 [Bug 2067098] ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2067022
--- Comment #2 from TEJ RATHI trathi@redhat.com --- Created ImageMagick tracking bugs for this issue:
Affects: fedora-all [bug 2067098]
https://bugzilla.redhat.com/show_bug.cgi?id=2067022
Product Security DevOps Team prodsec-dev@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CLOSED Resolution|--- |NOTABUG Last Closed| |2022-03-23 14:01:12
https://bugzilla.redhat.com/show_bug.cgi?id=2067022
Marian Rehak mrehak@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Alias| |CVE-2022-1115 Summary|ImageMagick: |CVE-2022-1115 ImageMagick: |heap-buffer-overflow in |heap-buffer-overflow in |PushShortPixel of |PushShortPixel of |quantum-private.h |quantum-private.h
https://bugzilla.redhat.com/show_bug.cgi?id=2067022
--- Doc Text *updated* by TEJ RATHI trathi@redhat.com --- A heap-buffer-overflow flaw was found in ImageMagicks' PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion that could potentially lead to a denial of service.
https://bugzilla.redhat.com/show_bug.cgi?id=2067022
TEJ RATHI trathi@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Fixed In Version| |ImageMagick6 v6.9.12-44, | |ImageMagick7 v7.1.0-29
https://bugzilla.redhat.com/show_bug.cgi?id=2067022
--- Doc Text *updated* by RaTasha Tillery-Smith rtillery@redhat.com --- A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.
https://bugzilla.redhat.com/show_bug.cgi?id=2067022 Bug 2067022 depends on bug 2067098, which changed state.
Bug 2067098 Summary: CVE-2022-1115 ImageMagick: heap-buffer-overflow in PushShortPixel of quantum-private.h [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2067098
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CLOSED Resolution|--- |CURRENTRELEASE
https://bugzilla.redhat.com/show_bug.cgi?id=2067022
--- Doc Text *updated* by Vipul Nair vinair@redhat.com --- A heap based buffer-overflow flaw was found in ImageMagick’s PushShortPixel function in quantum-private.h file. This vulnerability can be triggered by an attacker passing a specially crafted TIFF image file to ImageMagick for conversion, leading to a denial of service attack.
epel-packagers-sig@lists.fedoraproject.org