Bug 1928952 (CVE-2021-20241)
Summary: | CVE-2021-20241 ImageMagick: Division by zero in WriteJP2Image() in coders/jp2.c | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | fedora, jhorak, mike, pahan |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | ImageMagick 6.9.11-62, ImageMagick 7.0.10-62 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-02-18 19:03:03 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1929894, 1929895 | ||
Bug Blocks: | 1928960, 1928961 |
Description
Pedro Sampaio
2021-02-15 20:52:01 UTC
External References: https://github.com/ImageMagick/ImageMagick/pull/3177 Statement: This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata/ . Created ImageMagick tracking bugs for this issue: Affects: epel-8 [bug 1929894] Affects: fedora-all [bug 1929895] Flaw summary: In WriteJP2Image() of the jp2 coder in /coders/jp2.c, there is a divide-by-zero possible, on 2 lines, because jp2_image->comps[i].dy could be set to zero when ImageMagick processes a crafted input file. The patch addresses this by using the PerceptibleReciprocal() routine instead of division in the computations. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-20241 |