Mageia 2023-0136: imgagmagick security update
Summary
A vulnerability was discovered in ImageMagick where a specially created
SVG file loads itself and causes a segmentation fault. This flaw allows a
remote attacker to pass a specially crafted SVG file that leads to a
segmentation fault, generating many trash files in "/tmp," resulting in a
denial of service. When ImageMagick crashes, it generates a lot of trash
files. These trash files can be large if the SVG file contains many render
actions. In a denial of service attack, if a remote attacker uploads an
SVG file of size t, ImageMagick generates files of size 103*t. If an
attacker uploads a 100M SVG, the server will generate about 10G.
(CVE-2023-1289)
References
- https://bugs.mageia.org/show_bug.cgi?id=31761
- https://lists.suse.com/pipermail/sle-security-updates/2023-April/014341.html
- https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1289
Resolution
MGASA-2023-0136 - Updated imgagmagick packages fix security vulnerability
SRPMS
- 8/core/imagemagick-7.1.0.62-1.mga8
- 8/tainted/imagemagick-7.1.0.62-1.mga8.tainted