Bugzilla – Bug 1034872
VUL-1: CVE-2017-7942: ImageMagick: remote attack to consume an amount of available memory via a crafted file (ReadAVSImage function in avs.c)
Last modified: 2017-06-20 07:22:23 UTC
Created attachment 721717 [details] memory_leak__in_avs_CVE-2017-7942_testcase Ref: https://nvd.nist.gov/vuln/detail/CVE-2017-7942 ==================================================== The ReadAVSImage function in avs.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file. Source: MITRE Last Modified: 04/18/2017 ==================================================== Hyperlink [1] https://github.com/ImageMagick/ImageMagick/issues/429 [1]: =================================================== testcase: https://github.com/bestshow/p0cs/blob/master/memory-leak-in-avs.avs https://github.com/ImageMagick/ImageMagick/commit/962282327f3a28ffb1138f3ad3fb0438b57ae6b1 https://github.com/ImageMagick/ImageMagick/commit/fd84a5e8028778fd88772775361a2ee2b4bb6c47 =================================================== (open-)SUSE: https://software.opensuse.org/package/ImageMagick 7.0.5.4 (TW, official repo) 6.8.8.1 (42.{1,2}, official repo)
The code in ImageMagick in SLE12 does not use pixel_info. So I would say "not affected" for SLE, both IM and GM.
(In reply to Marcus Meissner from comment #1) > The code in ImageMagick in SLE12 does not use pixel_info. True, but I would free memory held by 'pixels' instead. What do you think?
GraphicsMagick: they do not bail out directly, just set status = MagickFail and memory is freed later. In my opinion not affected.
Tested with 12/ImageMagick: BEFORE $ valgrind --leak-check=full identify memory-leak-in-avs.avs [..] ==27580== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) $ AFTER $ valgrind --leak-check=full identify memory-leak-in-avs.avs [..] ==10987== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) $
Packages submitted.
.
I agree for GraphicsMagick.
SUSE-SU-2017:1489-1: An update that fixes 27 vulnerabilities is now available. Category: security (moderate) Bug References: 1028075,1033091,1034870,1034872,1034876,1036976,1036977,1036978,1036980,1036981,1036982,1036983,1036984,1036985,1036986,1036987,1036988,1036989,1036990,1036991,1037527,1038000,1040025,1040303,1040304,1040306,1040332 CVE References: CVE-2017-6502,CVE-2017-7606,CVE-2017-7941,CVE-2017-7942,CVE-2017-7943,CVE-2017-8343,CVE-2017-8344,CVE-2017-8345,CVE-2017-8346,CVE-2017-8347,CVE-2017-8348,CVE-2017-8349,CVE-2017-8350,CVE-2017-8351,CVE-2017-8352,CVE-2017-8353,CVE-2017-8354,CVE-2017-8355,CVE-2017-8356,CVE-2017-8357,CVE-2017-8765,CVE-2017-8830,CVE-2017-9098,CVE-2017-9141,CVE-2017-9142,CVE-2017-9143,CVE-2017-9144 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP2 (src): ImageMagick-6.8.8.1-70.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): ImageMagick-6.8.8.1-70.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): ImageMagick-6.8.8.1-70.1 SUSE Linux Enterprise Server 12-SP2 (src): ImageMagick-6.8.8.1-70.1 SUSE Linux Enterprise Desktop 12-SP2 (src): ImageMagick-6.8.8.1-70.1
openSUSE-SU-2017:1560-1: An update that fixes 27 vulnerabilities is now available. Category: security (moderate) Bug References: 1028075,1033091,1034870,1034872,1034876,1036976,1036977,1036978,1036980,1036981,1036982,1036983,1036984,1036985,1036986,1036987,1036988,1036989,1036990,1036991,1037527,1038000,1040025,1040303,1040304,1040306,1040332 CVE References: CVE-2017-6502,CVE-2017-7606,CVE-2017-7941,CVE-2017-7942,CVE-2017-7943,CVE-2017-8343,CVE-2017-8344,CVE-2017-8345,CVE-2017-8346,CVE-2017-8347,CVE-2017-8348,CVE-2017-8349,CVE-2017-8350,CVE-2017-8351,CVE-2017-8352,CVE-2017-8353,CVE-2017-8354,CVE-2017-8355,CVE-2017-8356,CVE-2017-8357,CVE-2017-8765,CVE-2017-8830,CVE-2017-9098,CVE-2017-9141,CVE-2017-9142,CVE-2017-9143,CVE-2017-9144 Sources used: openSUSE Leap 42.2 (src): ImageMagick-6.8.8.1-30.3.1
SUSE-SU-2017:1599-1: An update that fixes 25 vulnerabilities is now available. Category: security (moderate) Bug References: 1033091,1034870,1034872,1034876,1036976,1036978,1036980,1036981,1036983,1036984,1036985,1036986,1036987,1036988,1036989,1036990,1037527,1038000,1040025,1040303,1040304,1040306,1040332 CVE References: CVE-2014-9846,CVE-2016-10050,CVE-2017-7606,CVE-2017-7941,CVE-2017-7942,CVE-2017-7943,CVE-2017-8344,CVE-2017-8345,CVE-2017-8346,CVE-2017-8348,CVE-2017-8349,CVE-2017-8350,CVE-2017-8351,CVE-2017-8352,CVE-2017-8353,CVE-2017-8354,CVE-2017-8355,CVE-2017-8357,CVE-2017-8765,CVE-2017-8830,CVE-2017-9098,CVE-2017-9141,CVE-2017-9142,CVE-2017-9143,CVE-2017-9144 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): ImageMagick-6.4.3.6-7.77.1 SUSE Linux Enterprise Server 11-SP4 (src): ImageMagick-6.4.3.6-7.77.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): ImageMagick-6.4.3.6-7.77.1
released