Hide Forgot
A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.10-62. Upstream issue: https://github.com/ImageMagick/ImageMagick/issues/3176
External References: https://github.com/ImageMagick/ImageMagick/issues/3176
Created ImageMagick tracking bugs for this issue: Affects: epel-8 [bug 1929889] Affects: fedora-all [bug 1929890]
Flaw summary: When image->ticks_per_second is set to 0 in WriteAnimatedWEBPImage() of ImageMagick/coders/webp.c, a division by zero could occur, causing an impact to application availability if an attacker is able to submit a crafted input image file to be processed by ImageMagick. This is because image->ticks_per_second is acquired from the image file. The patch addresses the issue by using the PerceptibleReciprocal() function instead of division.
Upstream patch: https://github.com/ImageMagick/ImageMagick6/commit/a78d92dc0f468e79c3d761aae9707042952cdaca
Statement: This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata/ .
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-20245