<html>
<head>
<base href="https://bugzilla.rosalinux.ru/">
</head>
<body><table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Platform</th>
<td>2021.1
</td>
</tr>
<tr>
<th>Bug ID</th>
<td><a class="bz_bug_link
bz_status_CONFIRMED "
title="CONFIRMED - [CVE 21] imagemagick 7.1.0.30 CVEs found"
href="https://bugzilla.rosalinux.ru/show_bug.cgi?id=13541">13541</a>
</td>
</tr>
<tr>
<th>Summary</th>
<td>[CVE 21] imagemagick 7.1.0.30 CVEs found
</td>
</tr>
<tr>
<th>Classification</th>
<td>ROSA-based products
</td>
</tr>
<tr>
<th>Product</th>
<td>ROSA Fresh
</td>
</tr>
<tr>
<th>Version</th>
<td>All
</td>
</tr>
<tr>
<th>Hardware</th>
<td>All
</td>
</tr>
<tr>
<th>URL</th>
<td>CVE-2023-2157, CVE-2023-34151, CVE-2023-34152, CVE-2023-34153, CVE-2023-34474, CVE-2023-34475, CVE-2023-3745,
</td>
</tr>
<tr>
<th>OS</th>
<td>Linux
</td>
</tr>
<tr>
<th>Status</th>
<td>CONFIRMED
</td>
</tr>
<tr>
<th>Severity</th>
<td>normal
</td>
</tr>
<tr>
<th>Priority</th>
<td>Normal
</td>
</tr>
<tr>
<th>Component</th>
<td>System (kernel, glibc, systemd, bash, PAM...)
</td>
</tr>
<tr>
<th>Assignee</th>
<td>bugs@lists.rosalinux.ru
</td>
</tr>
<tr>
<th>Reporter</th>
<td>y.tumanov@rosalinux.ru
</td>
</tr>
<tr>
<th>QA Contact</th>
<td>bugs@lists.rosalinux.ru
</td>
</tr>
<tr>
<th>CC</th>
<td>e.kosachev@rosalinux.ru, s.matveev@rosalinux.ru, y.tumanov@rosalinux.ru
</td>
</tr>
<tr>
<th>Target Milestone</th>
<td>---
</td>
</tr>
<tr>
<th>Flags</th>
<td>secteam_verified?
</td>
</tr></table>
<p>
<div>
<pre>Please patch CVEs for package imagemagick version 7.1.0.30
INFO (CVEs are): imagemagick 7.1.0.30
cves found
CVE-2023-2157
Desc: A heap-based buffer overflow vulnerability was found in the ImageMagick
package that can lead to the application crashing.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2157">https://nvd.nist.gov/vuln/detail/CVE-2023-2157</a>
Severity: MEDIUM
CVE-2023-34151
Desc: A vulnerability was found in ImageMagick. This security flaw ouccers as
an undefined behaviors of casting double to size_t in svg, mvg and other coders
(recurring bugs of CVE-2022-32546).
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34151">https://nvd.nist.gov/vuln/detail/CVE-2023-34151</a>
Severity: MEDIUM
CVE-2023-34152
Desc: A vulnerability was found in ImageMagick. This security flaw cause a
remote code execution vulnerability in OpenBlob with --enable-pipes configured.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34152">https://nvd.nist.gov/vuln/detail/CVE-2023-34152</a>
Severity: CRITICAL
CVE-2023-34153
Desc: A vulnerability was found in ImageMagick. This security flaw causes a
shell command injection vulnerability via video:vsync or video:pixel-format
options in VIDEO encoding/decoding.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34153">https://nvd.nist.gov/vuln/detail/CVE-2023-34153</a>
Severity: HIGH
CVE-2023-34474
Desc: A heap-based buffer overflow issue was discovered in ImageMagick's
ReadTIM2ImageData() function in coders/tim2.c. A local attacker could trick the
user in opening specially crafted file, triggering an out-of-bounds read error,
allowing an application to crash, resulting in a denial of service.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34474">https://nvd.nist.gov/vuln/detail/CVE-2023-34474</a>
Severity: MEDIUM
CVE-2023-34475
Desc: A heap use after free issue was discovered in ImageMagick's
ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick
user to open a specially crafted file to convert, triggering an
heap-use-after-free write error, allowing an application to crash, resulting in
a denial of service.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34475">https://nvd.nist.gov/vuln/detail/CVE-2023-34475</a>
Severity: MEDIUM
CVE-2023-3745
Desc: A heap-based buffer overflow issue was found in ImageMagick's
PushCharPixel() function in quantum-private.h. This issue may allow a local
attacker to trick the user into opening a specially crafted file, triggering an
out-of-bounds read error and allowing an application to crash, resulting in a
denial of service.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3745">https://nvd.nist.gov/vuln/detail/CVE-2023-3745</a>
Severity: MEDIUM</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the QA Contact for the bug.</li>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>