Security update for GraphicsMagick
Announcement ID: | SUSE-SU-2018:0864-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 13 vulnerabilities can now be installed.
Description:
This update for GraphicsMagick fixes several issues.
These security issues were fixed:
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted file (bsc#1050087)
- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage function caused by a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments were never checked (bsc#1066170)
- CVE-2017-16352: Prevent a heap-based buffer overflow in the "Display visual image directory" feature of the DescribeImage() function. One possible way to trigger the vulnerability is to run the identify command on a specially crafted MIFF format file with the verbose flag (bsc#1066168)
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that allowed remote attackers to cause a denial of service (DrawDashPolygon heap-based buffer over-read and application crash) via a crafted file (bsc#1058630)
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to perform Denial of Service (NULL pointer dereference and application crash in AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image File as input (bsc#1059735)
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in ReadEnhMetaFile allowing for denial of service (bsc#1082291)
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in ReadOneMNGImage allowing for denial of service (bsc#1082283)
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a denial of service (memory consumption) via a crafted BMP file (bsc#1082348)
- CVE-2017-18219: Prevent allocation failure in the function ReadOnePNGImage, which allowed attackers to cause a denial of service via a crafted file that triggers an attempt at a large png_pixels array allocation (bsc#1084060)
- CVE-2017-18230: Prevent NULL pointer dereference in the function ReadCINEONImage, which allowed attackers to cause a denial of service via a crafted file (bsc#1085233).
- CVE-2017-18220: The ReadOneJNGImage and ReadJNGImage functions allowed remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file (bsc#1084062).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Software Development Kit 11 SP4
zypper in -t patch sdksp4-GraphicsMagick-13543=1
-
SUSE Studio Onsite 1.3
zypper in -t patch slestso13-GraphicsMagick-13543=1
Package List:
-
SUSE Linux Enterprise Software Development Kit 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- GraphicsMagick-1.2.5-78.44.1
- perl-GraphicsMagick-1.2.5-78.44.1
- libGraphicsMagick2-1.2.5-78.44.1
-
SUSE Studio Onsite 1.3 (x86_64)
- GraphicsMagick-1.2.5-78.44.1
- libGraphicsMagick2-1.2.5-78.44.1
References:
- https://www.suse.com/security/cve/CVE-2017-11524.html
- https://www.suse.com/security/cve/CVE-2017-12691.html
- https://www.suse.com/security/cve/CVE-2017-12693.html
- https://www.suse.com/security/cve/CVE-2017-14314.html
- https://www.suse.com/security/cve/CVE-2017-14343.html
- https://www.suse.com/security/cve/CVE-2017-14505.html
- https://www.suse.com/security/cve/CVE-2017-15016.html
- https://www.suse.com/security/cve/CVE-2017-15017.html
- https://www.suse.com/security/cve/CVE-2017-16352.html
- https://www.suse.com/security/cve/CVE-2017-16353.html
- https://www.suse.com/security/cve/CVE-2017-18219.html
- https://www.suse.com/security/cve/CVE-2017-18220.html
- https://www.suse.com/security/cve/CVE-2017-18230.html
- https://bugzilla.suse.com/show_bug.cgi?id=1050087
- https://bugzilla.suse.com/show_bug.cgi?id=1058630
- https://bugzilla.suse.com/show_bug.cgi?id=1059735
- https://bugzilla.suse.com/show_bug.cgi?id=1066168
- https://bugzilla.suse.com/show_bug.cgi?id=1066170
- https://bugzilla.suse.com/show_bug.cgi?id=1082283
- https://bugzilla.suse.com/show_bug.cgi?id=1082291
- https://bugzilla.suse.com/show_bug.cgi?id=1082348
- https://bugzilla.suse.com/show_bug.cgi?id=1084060
- https://bugzilla.suse.com/show_bug.cgi?id=1084062
- https://bugzilla.suse.com/show_bug.cgi?id=1085233