|Summary:||CVE-2020-25676 ImageMagick: outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c and MagickCore/cache.c|
|Product:||[Other] Security Response||Reporter:||Guilherme de Almeida Suckevicz <gsuckevi>|
|Component:||vulnerability||Assignee:||Red Hat Product Security <security-response-team>|
|Status:||CLOSED WONTFIX||QA Contact:|
|Version:||unspecified||CC:||fedora, jhorak, mike, pahan, rhel8-maint, security-response-team, stransky|
|Fixed In Version:||ImageMagick 7.0.9-0||Doc Type:||If docs needed, set a value|
A flaw was found ImageMagick. Multiple unconstrained pixel offset calculations produce undefined behavior in the form of out-of-range and integer overflows. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file. The highest threat from this vulnerability is to system availability.
|Last Closed:||2020-11-24 23:34:14 UTC||Type:||---|
|oVirt Team:||---||RHEL 7.3 requirements from Atomic Host:|
|Cloudforms Team:||---||Target Upstream Version:|
|Bug Depends On:||1901239, 1901240, 1910558|
Description Guilherme de Almeida Suckevicz 2020-10-27 17:39:18 UTC
In ImageMagick 7.0.8-68 there are 2 outside the range of representable values of type 'long' and 5 integer overflow at MagickCore/pixel.c,cache.c. Reference: https://github.com/ImageMagick/ImageMagick/issues/1732 Upstream patch: https://github.com/ImageMagick/ImageMagick/commit/406da3af9e09649cda152663c179902edf5ab3ac
Comment 1 Todd Cullum 2020-10-28 22:53:22 UTC
Flaw summary: In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior.
Comment 2 Todd Cullum 2020-10-28 22:56:45 UTC
Acknowledgments: Name: Suhwan Song (Seoul National University)
Comment 3 Todd Cullum 2020-10-29 19:16:20 UTC
Statement: This flaw is out of support scope for Red Hat Enterprise Linux 5, 6, and 7. Inkscape is not affected because it no longer uses a bundled ImageMagick in Red Hat Enterprise Linux 8. For more information regarding support scopes, please see https://access.redhat.com/support/policy/updates/errata .
Comment 4 Guilherme de Almeida Suckevicz 2020-11-24 19:07:07 UTC
Created ImageMagick tracking bugs for this issue: Affects: epel-8 [bug 1901239] Affects: fedora-all [bug 1901240]
Comment 5 Product Security DevOps Team 2020-11-24 23:34:14 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-25676