Bug 1181836 (CVE-2021-20176) - VUL-0: CVE-2021-20176: ImageMagick: processing crafted file leads to division by zero
Summary: VUL-0: CVE-2021-20176: ImageMagick: processing crafted file leads to division...
Status: RESOLVED FIXED
: CVE-2021-20242 (view as bug list)
Alias: CVE-2021-20176
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/277130/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-20176:5.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2021-02-05 12:10 UTC by Gianluca Gabrielli
Modified: 2024-07-08 13:09 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gianluca Gabrielli 2021-02-05 12:10:36 UTC
CVE-2021-20176


A flaw was found in ImageMagick in MagickCore/gem.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.10-56.

References: 
 
https://github.com/ImageMagick/ImageMagick/issues/3077

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1916610
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20176
Comment 2 Petr Gajdos 2021-02-09 10:28:03 UTC
There's no testcase.
Comment 3 Petr Gajdos 2021-02-09 12:32:40 UTC
Submitted for 15,12,11/ImageMagick.
Comment 4 Gianluca Gabrielli 2021-02-09 13:02:44 UTC
Hi Petr, can you please also check SUSE:SLE-15-SP2:Update?
Comment 8 Gianluca Gabrielli 2021-02-17 14:57:01 UTC
Two CVEs have been assigned to the same vulnerability (CVE-2021-20176, CVE-2021-20242) as explained here [0].

[0] https://github.com/ImageMagick/ImageMagick/pull/3192#issuecomment-779925131
Comment 9 Swamp Workflow Management 2021-02-19 17:19:32 UTC
SUSE-SU-2021:0528-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1179322,1181836
CVE References: CVE-2020-27767,CVE-2021-20176
JIRA References: 
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP5 (src):    ImageMagick-6.8.8.1-71.159.2
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    ImageMagick-6.8.8.1-71.159.2
SUSE Linux Enterprise Server 12-SP5 (src):    ImageMagick-6.8.8.1-71.159.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Petr Gajdos 2021-02-23 08:30:11 UTC
*** Bug 1182326 has been marked as a duplicate of this bug. ***
Comment 13 Gianluca Gabrielli 2021-12-02 11:09:16 UTC
Hi Petr, I think we have a missing submission for SUSE:SLE-15-SP2:Update.
Comment 14 Petr Gajdos 2021-12-07 14:42:10 UTC
This is now submitted also for 15sp2/ImageMagick.
Comment 16 Swamp Workflow Management 2021-12-10 20:19:10 UTC
SUSE-SU-2021:3996-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1181836
CVE References: CVE-2021-20176
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Development Tools 15-SP3 (src):    ImageMagick-7.0.7.34-10.18.1
SUSE Linux Enterprise Module for Development Tools 15-SP2 (src):    ImageMagick-7.0.7.34-10.18.1
SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (src):    ImageMagick-7.0.7.34-10.18.1
SUSE Linux Enterprise Module for Desktop Applications 15-SP2 (src):    ImageMagick-7.0.7.34-10.18.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 17 Swamp Workflow Management 2021-12-10 20:20:20 UTC
openSUSE-SU-2021:3996-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1181836
CVE References: CVE-2021-20176
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    ImageMagick-7.0.7.34-10.18.1
Comment 18 Swamp Workflow Management 2021-12-14 02:17:34 UTC
openSUSE-SU-2021:1583-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1181836
CVE References: CVE-2021-20176
JIRA References: 
Sources used:
openSUSE Leap 15.2 (src):    ImageMagick-7.0.7.34-lp152.12.18.1
Comment 33 Maintenance Automation 2023-12-01 20:30:04 UTC
SUSE-SU-2023:4634-1: An update that solves 24 vulnerabilities and has one security fix can now be installed.

Category: security (important)
Bug References: 1153866, 1181836, 1182325, 1182335, 1182336, 1182337, 1184624, 1184626, 1184627, 1184628, 1195563, 1197147, 1199350, 1200387, 1200388, 1200389, 1202250, 1202800, 1207982, 1207983, 1209141, 1211791, 1213624, 1214578, 1215939
CVE References: CVE-2019-17540, CVE-2020-21679, CVE-2021-20176, CVE-2021-20224, CVE-2021-20241, CVE-2021-20243, CVE-2021-20244, CVE-2021-20246, CVE-2021-20309, CVE-2021-20311, CVE-2021-20312, CVE-2021-20313, CVE-2022-0284, CVE-2022-2719, CVE-2022-28463, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547, CVE-2022-44267, CVE-2022-44268, CVE-2023-1289, CVE-2023-34151, CVE-2023-3745, CVE-2023-5341
Sources used:
SUSE CaaS Platform 4.0 (src): ImageMagick-7.0.7.34-150000.3.123.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): ImageMagick-7.0.7.34-150000.3.123.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): ImageMagick-7.0.7.34-150000.3.123.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): ImageMagick-7.0.7.34-150000.3.123.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 34 Andrea Mattiazzo 2024-07-08 13:09:18 UTC
All done, closing.