Bug 37077 - imagemagick: Multiple issues (4.0)
imagemagick: Multiple issues (4.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.0
Other Linux
: P2 normal (vote)
: UCS 4.0-5-errata
Assigned To: Arvid Requate
Daniel Tröder
:
Depends on: 41331
Blocks:
  Show dependency treegraph
 
Reported: 2014-11-27 11:03 CET by Moritz Muehlenhoff
Modified: 2016-05-27 12:52 CEST (History)
1 user (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Security
Max CVSS v3 score:
requate: Patch_Available+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-11-27 11:03:47 CET
Denial of service through out of bound reads in the parsers for PCX, DCM (CVE-2014-8354, CVE-2014-8355 CVE-2014-8362)

Out of bounds memory access in JPEG parsing (CVE-2014-8716)
Comment 1 Arvid Requate univentionstaff 2015-03-30 19:37:23 CEST
Buffer overflow in DCM parser (CVE-2014-8562, minor)
Comment 2 Arvid Requate univentionstaff 2015-05-06 18:31:42 CEST
All of the issues above have been classified as "Minor issue" in Debian.

CVE-2014-8362 looks like a typo, probably is CVE-2014-8562
Comment 3 Stefan Gohmann univentionstaff 2015-09-01 14:24:08 CEST
The issue classified as minor issues. Removing target milestone.
Comment 4 Arvid Requate univentionstaff 2016-04-14 21:21:40 CEST
Upstream Debian package version 8:6.7.7.10-5+deb7u4 fixes several issues without CVE. The DSA says:

"This update fixes a large number of potential security problems such as null-pointer access and buffer-overflows that might lead to memory leaks or denial of service."
Comment 5 Arvid Requate univentionstaff 2016-05-23 16:14:47 CEST
Upstream Debian package version 8:6.7.7.10-5+deb7u5 fixes several issues:

Several vulnerabilities in ImageMagick, a program suite for image manipulation. These vulnerabilities, collectively known as ImageTragick, are the consequence of lack of sanitization of untrusted input. An attacker with control on the image input could, with the privileges of the user running the application, execute code (CVE-2016-3714), make HTTP GET or FTP requests (CVE-2016-3718), or delete (CVE-2016-3715), move (CVE-2016-3716), or read (CVE-2016-3717) local files.
Comment 6 Arvid Requate univentionstaff 2016-05-23 20:00:33 CEST
DLA version imported and built in errata4.0-5.
Advisory: imagemagick.yaml
Comment 7 Daniel Tröder univentionstaff 2016-05-26 09:02:18 CEST
OK: DEBIAN_FRONTEND=noninteractive apt-get install --reinstall imagemagick imagemagick-common
OK: manual functional test:
# convert /var/www/icon/ox.png /tmp/ox.jpg
# file /var/www/icon/ox.png /tmp/ox.jpg
/var/www/icon/ox.png: PNG image data, 50 x 50, 8-bit/color RGBA, non-interlaced
/tmp/ox.jpg:          JPEG image data, JFIF standard 1.01
OK: advisory
Comment 8 Janek Walkenhorst univentionstaff 2016-05-27 12:52:07 CEST
<http://errata.software-univention.de/ucs/4.0/426.html>