Bug 1898296 (CVE-2020-27774)

Summary: CVE-2020-27774 ImageMagick: integer overflow at MagickCore/statistic.c
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: fedora, jhorak, mike, pahan, rhel8-maint, security-response-team, stransky
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: ImageMagick 7.0.9-0 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-11-24 23:35:30 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1901293, 1901294, 1910528    
Bug Blocks: 1891602    

Description Guilherme de Almeida Suckevicz 2020-11-16 18:40:13 UTC
In ImageMagick, there is a shift exponent 65 is too large for 64-bit type 'ssize_t' at MagickCore/statistic.c.

Reference:
https://github.com/ImageMagick/ImageMagick/issues/1743

Upstream patch:
https://github.com/ImageMagick/ImageMagick/commit/29cee9152d1b5487cfd19443ca48935eea0cabe2

Comment 1 Guilherme de Almeida Suckevicz 2020-11-16 18:40:16 UTC
Acknowledgments:

Name: Suhwan Song (Seoul National University)

Comment 2 Todd Cullum 2020-11-16 20:58:26 UTC
Statement:

This flaw is out of support scope for Red Hat Enterprise Linux 5, 6, and 7. Inkscape is not affected because it no longer uses a bundled ImageMagick in Red Hat Enterprise Linux 8. For more information regarding support scopes, please see https://access.redhat.com/support/policy/updates/errata .

Comment 3 Todd Cullum 2020-11-16 21:08:28 UTC
Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case.

Comment 4 Guilherme de Almeida Suckevicz 2020-11-24 19:30:37 UTC
Created ImageMagick tracking bugs for this issue:

Affects: epel-8 [bug 1901293]
Affects: fedora-all [bug 1901294]

Comment 5 Product Security DevOps Team 2020-11-24 23:35:30 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-27774