OESA-2021-1198

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1198
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2021-1198.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2021-1198
Upstream
Published
2021-05-30T11:02:55Z
Modified
2025-08-12T05:06:07.525090Z
Summary
ImageMagick security update
Details

Use ImageMagick to create, edit, compose, or convert bitmap images. It can read and write images in a variety of formats (over 200) including PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR, WebP, Postscript, PDF, and SVG. Use ImageMagick to resize, flip, mirror, rotate, distort, shear and transform images, adjust image colors, apply various special effects, or draw text, lines, polygons, ellipses and Bézier curves.

Security Fix(es):

A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This flaw affects ImageMagick versions prior to 7.0.9-0.(CVE-2020-27752)

A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.(CVE-2021-20313)

A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.(CVE-2021-20311)

A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.(CVE-2021-20312)

A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.(CVE-2021-20309)

In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c.(CVE-2020-27769)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / ImageMagick

Package

Name
ImageMagick
Purl
pkg:rpm/openEuler/ImageMagick&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.9.10.67-24.oe1

Ecosystem specific

{
    "x86_64": [
        "ImageMagick-c++-6.9.10.67-24.oe1.x86_64.rpm",
        "ImageMagick-6.9.10.67-24.oe1.x86_64.rpm",
        "ImageMagick-c++-devel-6.9.10.67-24.oe1.x86_64.rpm",
        "ImageMagick-debugsource-6.9.10.67-24.oe1.x86_64.rpm",
        "ImageMagick-debuginfo-6.9.10.67-24.oe1.x86_64.rpm",
        "ImageMagick-devel-6.9.10.67-24.oe1.x86_64.rpm",
        "ImageMagick-perl-6.9.10.67-24.oe1.x86_64.rpm",
        "ImageMagick-help-6.9.10.67-24.oe1.x86_64.rpm"
    ],
    "src": [
        "ImageMagick-6.9.10.67-24.oe1.src.rpm"
    ],
    "aarch64": [
        "ImageMagick-c++-devel-6.9.10.67-24.oe1.aarch64.rpm",
        "ImageMagick-c++-6.9.10.67-24.oe1.aarch64.rpm",
        "ImageMagick-debuginfo-6.9.10.67-24.oe1.aarch64.rpm",
        "ImageMagick-help-6.9.10.67-24.oe1.aarch64.rpm",
        "ImageMagick-6.9.10.67-24.oe1.aarch64.rpm",
        "ImageMagick-debugsource-6.9.10.67-24.oe1.aarch64.rpm",
        "ImageMagick-perl-6.9.10.67-24.oe1.aarch64.rpm",
        "ImageMagick-devel-6.9.10.67-24.oe1.aarch64.rpm"
    ]
}