Security update for ImageMagick

Announcement ID: SUSE-SU-2018:0055-1
Rating: moderate
References:
Cross-References:
CVSS scores:
  • CVE-2017-1000445 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  • CVE-2017-1000445 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2017-1000445 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2017-1000476 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2017-11449 ( SUSE ): 5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  • CVE-2017-11449 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2017-11751 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2017-11751 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2017-12430 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2017-12430 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2017-12642 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  • CVE-2017-12642 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2017-14249 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  • CVE-2017-14249 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2017-17680 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  • CVE-2017-17680 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2017-17882 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2017-9409 ( SUSE ): 4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  • CVE-2017-9409 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
  • SUSE Linux Enterprise Desktop 12 SP2
  • SUSE Linux Enterprise Desktop 12 SP3
  • SUSE Linux Enterprise High Performance Computing 12 SP2
  • SUSE Linux Enterprise High Performance Computing 12 SP3
  • SUSE Linux Enterprise Server 12 SP2
  • SUSE Linux Enterprise Server 12 SP3
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3
  • SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2
  • SUSE Linux Enterprise Software Development Kit 12 12-SP2
  • SUSE Linux Enterprise Software Development Kit 12 SP3
  • SUSE Linux Enterprise Workstation Extension 12 12-SP3
  • SUSE Linux Enterprise Workstation Extension 12 SP2

An update that solves 10 vulnerabilities can now be installed.

Description:

This update for ImageMagick fixes several issues.

These security issues were fixed:

  • CVE-2017-1000476: A CPU exhaustion vulnerability was found in the function ReadDDSInfo in coders/dds.c, which allowed attackers to cause a denial of service (bsc#1074610).
  • CVE-2017-9409: The ReadMPCImage function in mpc.c allowed attackers to cause a denial of service (memory leak) via a crafted file (bsc#1042948).
  • CVE-2017-1000445: A NULL pointer dereference in the MagickCore component might have lead to denial of service (bsc#1074425).
  • CVE-2017-17680: Prevent a memory leak in the function ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of service via a crafted XPM image file (a different vulnerability than CVE-2017-17882) (bsc#1072902).
  • CVE-2017-17882: Prevent a memory leak in the function ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial of service via a crafted XPM image file (a different vulnerability than CVE-2017-17680) (bsc#1074122).
  • CVE-2017-11449: coders/mpc did not enable seekable streams and thus could not validate blob sizes, which allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an image received from stdin (bsc#1049373).
  • CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in coders/mpc.c allowed attackers to cause DoS (bsc#1052252).
  • CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in coders\mpc.c via crafted file allowing for DoS (bsc#1052771).
  • CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c that lead to a division by zero in GetPixelCacheTileSize in MagickCore/cache.c allowed remote attackers to cause a denial of service via a crafted file (bsc#1058082).
  • Prevent memory leak via crafted file in pwp.c allowing for DoS (bsc#1051412)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Desktop 12 SP2
    zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2018-41=1
  • SUSE Linux Enterprise Desktop 12 SP3
    zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-41=1
  • SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2
    zypper in -t patch SUSE-SLE-RPI-12-SP2-2018-41=1
  • SUSE Linux Enterprise Software Development Kit 12 12-SP2
    zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-41=1
  • SUSE Linux Enterprise Software Development Kit 12 SP3
    zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-41=1
  • SUSE Linux Enterprise High Performance Computing 12 SP2
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-41=1
  • SUSE Linux Enterprise Server 12 SP2
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-41=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-41=1
  • SUSE Linux Enterprise Server 12 SP3
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-41=1
  • SUSE Linux Enterprise High Performance Computing 12 SP3
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-41=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-41=1
  • SUSE Linux Enterprise Workstation Extension 12 SP2
    zypper in -t patch SUSE-SLE-WE-12-SP2-2018-41=1
  • SUSE Linux Enterprise Workstation Extension 12 12-SP3
    zypper in -t patch SUSE-SLE-WE-12-SP3-2018-41=1

Package List:

  • SUSE Linux Enterprise Desktop 12 SP2 (x86_64)
    • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
    • libMagick++-6_Q16-3-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
    • ImageMagick-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1
  • SUSE Linux Enterprise Desktop 12 SP3 (x86_64)
    • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
    • libMagick++-6_Q16-3-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
    • ImageMagick-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1
  • SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 (aarch64)
    • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1
  • SUSE Linux Enterprise Software Development Kit 12 12-SP2 (aarch64 ppc64le s390x x86_64)
    • libMagick++-devel-6.8.8.1-71.23.1
    • libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
    • libMagick++-6_Q16-3-6.8.8.1-71.23.1
    • perl-PerlMagick-6.8.8.1-71.23.1
    • ImageMagick-devel-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • ImageMagick-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1
    • perl-PerlMagick-debuginfo-6.8.8.1-71.23.1
  • SUSE Linux Enterprise Software Development Kit 12 SP3 (aarch64 ppc64le s390x x86_64)
    • libMagick++-devel-6.8.8.1-71.23.1
    • libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
    • libMagick++-6_Q16-3-6.8.8.1-71.23.1
    • perl-PerlMagick-6.8.8.1-71.23.1
    • ImageMagick-devel-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • ImageMagick-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1
    • perl-PerlMagick-debuginfo-6.8.8.1-71.23.1
  • SUSE Linux Enterprise High Performance Computing 12 SP2 (aarch64 x86_64)
    • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1
  • SUSE Linux Enterprise Server 12 SP2 (aarch64 ppc64le s390x x86_64)
    • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2 (ppc64le x86_64)
    • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1
  • SUSE Linux Enterprise Server 12 SP3 (aarch64 ppc64le s390x x86_64)
    • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1
  • SUSE Linux Enterprise High Performance Computing 12 SP3 (aarch64 x86_64)
    • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP3 (ppc64le x86_64)
    • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1
  • SUSE Linux Enterprise Workstation Extension 12 SP2 (x86_64)
    • libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1
    • libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
    • libMagick++-6_Q16-3-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • ImageMagick-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1
  • SUSE Linux Enterprise Workstation Extension 12 12-SP3 (x86_64)
    • libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1
    • libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
    • libMagick++-6_Q16-3-6.8.8.1-71.23.1
    • libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.23.1
    • ImageMagick-debugsource-6.8.8.1-71.23.1
    • ImageMagick-6.8.8.1-71.23.1
    • ImageMagick-debuginfo-6.8.8.1-71.23.1

References: