Security update for GraphicsMagick
Announcement ID: | SUSE-SU-2017:3435-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 14 vulnerabilities can now be installed.
Description:
This update for GraphicsMagick fixes the following issues:
- CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c could lead to denial of service [bsc#1050632]
- CVE-2017-14342: Memory exhaustion in ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1058485]
- CVE-2017-14341: Infinite loop in the ReadWPGImage function could lead to denial of service [bsc#1058637]
- CVE-2017-16546: Issue in ReadWPGImage function in coders/wpg.c could lead to denial of service [bsc#1067181]
- CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in validation problems could lead to denial of service [bsc#1067184]
- CVE-2017-16669: coders/wpg.c allows remote attackers to cause a denial of service via crafted file [bsc#1067409]
- CVE-2017-13776: denial of service issue in ReadXBMImage() in a coders/xbm.c [bsc#1056429]
- CVE-2017-13777: denial of service issue in ReadXBMImage() in a coders/xbm.c [bsc#1056426]
- CVE-2017-13134: heap-based buffer over-read in the function SFWScan in coders/sfw.c could lead to denial of service via a crafted file [bsc#1055214]
- CVE-2017-15930: Null Pointer dereference while transfering JPEG scanlines could lead to denial of service [bsc#1066003]
- CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file. [bsc#1054757]
- CVE-2017-14165: The ReadSUNImage function in coders/sun.c has an issue where memory allocation is excessive because it depends only on a length field in a header. This may lead to remote denial of service in the MagickMalloc function in magick/memory.c. [bsc#1057508]
- CVE-2017-12587: Large loop vulnerability in the ReadPWPImage function in coders\pwp.c. [bsc#1052450]
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Software Development Kit 11 SP4
zypper in -t patch sdksp4-GraphicsMagick-13386=1
-
SUSE Studio Onsite 1.3
zypper in -t patch slestso13-GraphicsMagick-13386=1
Package List:
-
SUSE Linux Enterprise Software Development Kit 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- GraphicsMagick-1.2.5-4.78.19.1
- perl-GraphicsMagick-1.2.5-4.78.19.1
- libGraphicsMagick2-1.2.5-4.78.19.1
-
SUSE Studio Onsite 1.3 (x86_64)
- GraphicsMagick-1.2.5-4.78.19.1
- libGraphicsMagick2-1.2.5-4.78.19.1
References:
- https://www.suse.com/security/cve/CVE-2016-7996.html
- https://www.suse.com/security/cve/CVE-2017-11640.html
- https://www.suse.com/security/cve/CVE-2017-12587.html
- https://www.suse.com/security/cve/CVE-2017-12983.html
- https://www.suse.com/security/cve/CVE-2017-13134.html
- https://www.suse.com/security/cve/CVE-2017-13776.html
- https://www.suse.com/security/cve/CVE-2017-13777.html
- https://www.suse.com/security/cve/CVE-2017-14165.html
- https://www.suse.com/security/cve/CVE-2017-14341.html
- https://www.suse.com/security/cve/CVE-2017-14342.html
- https://www.suse.com/security/cve/CVE-2017-15930.html
- https://www.suse.com/security/cve/CVE-2017-16545.html
- https://www.suse.com/security/cve/CVE-2017-16546.html
- https://www.suse.com/security/cve/CVE-2017-16669.html
- https://bugzilla.suse.com/show_bug.cgi?id=1050632
- https://bugzilla.suse.com/show_bug.cgi?id=1052450
- https://bugzilla.suse.com/show_bug.cgi?id=1054757
- https://bugzilla.suse.com/show_bug.cgi?id=1055214
- https://bugzilla.suse.com/show_bug.cgi?id=1056426
- https://bugzilla.suse.com/show_bug.cgi?id=1056429
- https://bugzilla.suse.com/show_bug.cgi?id=1057508
- https://bugzilla.suse.com/show_bug.cgi?id=1058485
- https://bugzilla.suse.com/show_bug.cgi?id=1058637
- https://bugzilla.suse.com/show_bug.cgi?id=1066003
- https://bugzilla.suse.com/show_bug.cgi?id=1067181
- https://bugzilla.suse.com/show_bug.cgi?id=1067184
- https://bugzilla.suse.com/show_bug.cgi?id=1067409