Bug 37077

Summary: imagemagick: Multiple issues (4.0)
Product: UCS Reporter: Moritz Muehlenhoff <jmm>
Component: Security updatesAssignee: Arvid Requate <requate>
Status: CLOSED FIXED QA Contact: Daniel Tröder <troeder>
Severity: normal    
Priority: P2 CC: requate
Version: UCS 4.0Flags: requate: Patch_Available+
Target Milestone: UCS 4.0-5-errata   
Hardware: Other   
OS: Linux   
What kind of report is it?: --- What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional): Security
Max CVSS v3 score:
Bug Depends on: 41331    
Bug Blocks:    

Description Moritz Muehlenhoff univentionstaff 2014-11-27 11:03:47 CET
Denial of service through out of bound reads in the parsers for PCX, DCM (CVE-2014-8354, CVE-2014-8355 CVE-2014-8362)

Out of bounds memory access in JPEG parsing (CVE-2014-8716)
Comment 1 Arvid Requate univentionstaff 2015-03-30 19:37:23 CEST
Buffer overflow in DCM parser (CVE-2014-8562, minor)
Comment 2 Arvid Requate univentionstaff 2015-05-06 18:31:42 CEST
All of the issues above have been classified as "Minor issue" in Debian.

CVE-2014-8362 looks like a typo, probably is CVE-2014-8562
Comment 3 Stefan Gohmann univentionstaff 2015-09-01 14:24:08 CEST
The issue classified as minor issues. Removing target milestone.
Comment 4 Arvid Requate univentionstaff 2016-04-14 21:21:40 CEST
Upstream Debian package version 8:6.7.7.10-5+deb7u4 fixes several issues without CVE. The DSA says:

"This update fixes a large number of potential security problems such as null-pointer access and buffer-overflows that might lead to memory leaks or denial of service."
Comment 5 Arvid Requate univentionstaff 2016-05-23 16:14:47 CEST
Upstream Debian package version 8:6.7.7.10-5+deb7u5 fixes several issues:

Several vulnerabilities in ImageMagick, a program suite for image manipulation. These vulnerabilities, collectively known as ImageTragick, are the consequence of lack of sanitization of untrusted input. An attacker with control on the image input could, with the privileges of the user running the application, execute code (CVE-2016-3714), make HTTP GET or FTP requests (CVE-2016-3718), or delete (CVE-2016-3715), move (CVE-2016-3716), or read (CVE-2016-3717) local files.
Comment 6 Arvid Requate univentionstaff 2016-05-23 20:00:33 CEST
DLA version imported and built in errata4.0-5.
Advisory: imagemagick.yaml
Comment 7 Daniel Tröder univentionstaff 2016-05-26 09:02:18 CEST
OK: DEBIAN_FRONTEND=noninteractive apt-get install --reinstall imagemagick imagemagick-common
OK: manual functional test:
# convert /var/www/icon/ox.png /tmp/ox.jpg
# file /var/www/icon/ox.png /tmp/ox.jpg
/var/www/icon/ox.png: PNG image data, 50 x 50, 8-bit/color RGBA, non-interlaced
/tmp/ox.jpg:          JPEG image data, JFIF standard 1.01
OK: advisory
Comment 8 Janek Walkenhorst univentionstaff 2016-05-27 12:52:07 CEST
<http://errata.software-univention.de/ucs/4.0/426.html>