Hide Forgot
The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file. Reference: https://github.com/ImageMagick/ImageMagick/issues/1472 Upstream commit: https://github.com/ImageMagick/ImageMagick/commit/e3cdce6fe12193f235b8c0ae5efe6880a25eb957
Created GraphicsMagick tracking bugs for this issue: Affects: fedora-all [bug 1707774] Created ImageMagick tracking bugs for this issue: Affects: fedora-all [bug 1707773]
Created GraphicsMagick tracking bugs for this issue: Affects: epel-all [bug 1707775]
Mitigation: You can configure a security policy that limits the disk resource usage when running ImageMagick. Edit /etc/ImageMagick/policy.xml with: ``` <policymap> ... <policy domain="resource" name="disk" value="1GiB"/> ... </policymap> ```
ImageMagick6 commit: https://github.com/ImageMagick/ImageMagick6/commit/a0473b29add9521ffd4c74f6f623b418811762b0
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1180 https://access.redhat.com/errata/RHSA-2020:1180
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-11470