Security update for ImageMagick
Announcement ID: | SUSE-SU-2017:0586-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 21 vulnerabilities can now be installed.
Description:
This update for ImageMagick fixes the following issues:
- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)
- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)
- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)
- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)
- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)
- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314).
- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)
- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319).
- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320).
- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)
- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)
- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)
- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326).
- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433).
- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435).
- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)
- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436).
- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439).
- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441).
- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)
This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Software Development Kit 11 SP4
zypper in -t patch sdksp4-ImageMagick-12998=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-ImageMagick-12998=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-ImageMagick-12998=1
Package List:
-
SUSE Linux Enterprise Software Development Kit 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- ImageMagick-devel-6.4.3.6-7.65.1
- ImageMagick-6.4.3.6-7.65.1
- libMagickWand1-6.4.3.6-7.65.1
- libMagick++-devel-6.4.3.6-7.65.1
- perl-PerlMagick-6.4.3.6-7.65.1
- libMagick++1-6.4.3.6-7.65.1
-
SUSE Linux Enterprise Software Development Kit 11 SP4 (ppc64 s390x x86_64)
- libMagickWand1-32bit-6.4.3.6-7.65.1
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- libMagickCore1-6.4.3.6-7.65.1
-
SUSE Linux Enterprise Server 11 SP4 (ppc64 s390x x86_64)
- libMagickCore1-32bit-6.4.3.6-7.65.1
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- libMagickCore1-6.4.3.6-7.65.1
- libMagickCore1-32bit-6.4.3.6-7.65.1
References:
- https://www.suse.com/security/cve/CVE-2016-10046.html
- https://www.suse.com/security/cve/CVE-2016-10048.html
- https://www.suse.com/security/cve/CVE-2016-10049.html
- https://www.suse.com/security/cve/CVE-2016-10050.html
- https://www.suse.com/security/cve/CVE-2016-10051.html
- https://www.suse.com/security/cve/CVE-2016-10052.html
- https://www.suse.com/security/cve/CVE-2016-10059.html
- https://www.suse.com/security/cve/CVE-2016-10060.html
- https://www.suse.com/security/cve/CVE-2016-10063.html
- https://www.suse.com/security/cve/CVE-2016-10064.html
- https://www.suse.com/security/cve/CVE-2016-10065.html
- https://www.suse.com/security/cve/CVE-2016-10068.html
- https://www.suse.com/security/cve/CVE-2016-10070.html
- https://www.suse.com/security/cve/CVE-2016-10071.html
- https://www.suse.com/security/cve/CVE-2016-10144.html
- https://www.suse.com/security/cve/CVE-2016-10145.html
- https://www.suse.com/security/cve/CVE-2016-10146.html
- https://www.suse.com/security/cve/CVE-2017-5506.html
- https://www.suse.com/security/cve/CVE-2017-5507.html
- https://www.suse.com/security/cve/CVE-2017-5508.html
- https://www.suse.com/security/cve/CVE-2017-5511.html
- https://bugzilla.suse.com/show_bug.cgi?id=1017308
- https://bugzilla.suse.com/show_bug.cgi?id=1017310
- https://bugzilla.suse.com/show_bug.cgi?id=1017311
- https://bugzilla.suse.com/show_bug.cgi?id=1017312
- https://bugzilla.suse.com/show_bug.cgi?id=1017313
- https://bugzilla.suse.com/show_bug.cgi?id=1017314
- https://bugzilla.suse.com/show_bug.cgi?id=1017318
- https://bugzilla.suse.com/show_bug.cgi?id=1017319
- https://bugzilla.suse.com/show_bug.cgi?id=1017320
- https://bugzilla.suse.com/show_bug.cgi?id=1017321
- https://bugzilla.suse.com/show_bug.cgi?id=1017322
- https://bugzilla.suse.com/show_bug.cgi?id=1017324
- https://bugzilla.suse.com/show_bug.cgi?id=1017326
- https://bugzilla.suse.com/show_bug.cgi?id=1017421
- https://bugzilla.suse.com/show_bug.cgi?id=1020433
- https://bugzilla.suse.com/show_bug.cgi?id=1020435
- https://bugzilla.suse.com/show_bug.cgi?id=1020436
- https://bugzilla.suse.com/show_bug.cgi?id=1020439
- https://bugzilla.suse.com/show_bug.cgi?id=1020441
- https://bugzilla.suse.com/show_bug.cgi?id=1020443
- https://bugzilla.suse.com/show_bug.cgi?id=1020448