Security update for ImageMagick
Announcement ID: | SUSE-SU-2018:3095-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves nine vulnerabilities and has one security fix can now be installed.
Description:
This update for ImageMagick fixes the following security issues:
- CVE-2017-11532: Prevent a memory leak vulnerability in the WriteMPCImage() function in coders/mpc.c via a crafted file allowing for DoS (bsc#1050129)
- CVE-2018-16750: Prevent memory leak in the formatIPTCfromBuffer function (bsc#1108283)
- CVE-2018-16749: Added missing NULL check in ReadOneJNGImage that allowed an attacker to cause a denial of service (WriteBlob assertion failure and application exit) via a crafted file (bsc#1108282)
- CVE-2018-16642: The function InsertRow allowed remote attackers to cause a denial of service via a crafted image file due to an out-of-bounds write (bsc#1107616)
- CVE-2018-16640: Prevent memory leak in the function ReadOneJNGImage (bsc#1107619)
- CVE-2018-16643: The functions ReadDCMImage, ReadPWPImage, ReadCALSImage, and ReadPICTImage did check the return value of the fputc function, which allowed remote attackers to cause a denial of service via a crafted image file (bsc#1107612)
- CVE-2018-16644: Added missing check for length in the functions ReadDCMImage and ReadPICTImage, which allowed remote attackers to cause a denial of service via a crafted image (bsc#1107609)
- CVE-2018-16645: Prevent excessive memory allocation issue in the functions ReadBMPImage and ReadDIBImage, which allowed remote attackers to cause a denial of service via a crafted image file (bsc#1107604)
- CVE-2018-16413: Prevent heap-based buffer over-read in the PushShortPixel function leading to DoS (bsc#1106989)
This update also relaxes the restrictions of use of Postscript like formats to "write" only. (bsc#1105592)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 12 SP3
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-2195=1
-
SUSE Linux Enterprise Software Development Kit 12 SP3
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-2195=1
-
SUSE Linux Enterprise Server 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2195=1
-
SUSE Linux Enterprise High Performance Computing 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2195=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2195=1
-
SUSE Linux Enterprise Workstation Extension 12 12-SP3
zypper in -t patch SUSE-SLE-WE-12-SP3-2018-2195=1
Package List:
-
SUSE Linux Enterprise Desktop 12 SP3 (x86_64)
- libMagickCore-6_Q16-1-6.8.8.1-71.79.1
- libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.79.1
- libMagick++-6_Q16-3-6.8.8.1-71.79.1
- libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.79.1
- ImageMagick-debugsource-6.8.8.1-71.79.1
- libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.79.1
- libMagickCore-6_Q16-1-32bit-6.8.8.1-71.79.1
- ImageMagick-debuginfo-6.8.8.1-71.79.1
- libMagickWand-6_Q16-1-6.8.8.1-71.79.1
- ImageMagick-6.8.8.1-71.79.1
- libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.79.1
-
SUSE Linux Enterprise Software Development Kit 12 SP3 (aarch64 ppc64le s390x x86_64)
- perl-PerlMagick-6.8.8.1-71.79.1
- perl-PerlMagick-debuginfo-6.8.8.1-71.79.1
- libMagick++-6_Q16-3-6.8.8.1-71.79.1
- libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.79.1
- ImageMagick-debugsource-6.8.8.1-71.79.1
- libMagick++-devel-6.8.8.1-71.79.1
- ImageMagick-debuginfo-6.8.8.1-71.79.1
- ImageMagick-devel-6.8.8.1-71.79.1
- ImageMagick-6.8.8.1-71.79.1
-
SUSE Linux Enterprise Server 12 SP3 (aarch64 ppc64le s390x x86_64)
- libMagickCore-6_Q16-1-6.8.8.1-71.79.1
- ImageMagick-debugsource-6.8.8.1-71.79.1
- libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.79.1
- ImageMagick-debuginfo-6.8.8.1-71.79.1
- libMagickWand-6_Q16-1-6.8.8.1-71.79.1
- libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.79.1
-
SUSE Linux Enterprise High Performance Computing 12 SP3 (aarch64 x86_64)
- libMagickCore-6_Q16-1-6.8.8.1-71.79.1
- ImageMagick-debugsource-6.8.8.1-71.79.1
- libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.79.1
- ImageMagick-debuginfo-6.8.8.1-71.79.1
- libMagickWand-6_Q16-1-6.8.8.1-71.79.1
- libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.79.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3 (ppc64le x86_64)
- libMagickCore-6_Q16-1-6.8.8.1-71.79.1
- ImageMagick-debugsource-6.8.8.1-71.79.1
- libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.79.1
- ImageMagick-debuginfo-6.8.8.1-71.79.1
- libMagickWand-6_Q16-1-6.8.8.1-71.79.1
- libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.79.1
-
SUSE Linux Enterprise Workstation Extension 12 12-SP3 (x86_64)
- libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.79.1
- libMagick++-6_Q16-3-6.8.8.1-71.79.1
- libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.79.1
- ImageMagick-debugsource-6.8.8.1-71.79.1
- libMagickCore-6_Q16-1-32bit-6.8.8.1-71.79.1
- ImageMagick-debuginfo-6.8.8.1-71.79.1
- ImageMagick-6.8.8.1-71.79.1
References:
- https://www.suse.com/security/cve/CVE-2017-11532.html
- https://www.suse.com/security/cve/CVE-2018-16413.html
- https://www.suse.com/security/cve/CVE-2018-16640.html
- https://www.suse.com/security/cve/CVE-2018-16642.html
- https://www.suse.com/security/cve/CVE-2018-16643.html
- https://www.suse.com/security/cve/CVE-2018-16644.html
- https://www.suse.com/security/cve/CVE-2018-16645.html
- https://www.suse.com/security/cve/CVE-2018-16749.html
- https://www.suse.com/security/cve/CVE-2018-16750.html
- https://bugzilla.suse.com/show_bug.cgi?id=1050129
- https://bugzilla.suse.com/show_bug.cgi?id=1105592
- https://bugzilla.suse.com/show_bug.cgi?id=1106989
- https://bugzilla.suse.com/show_bug.cgi?id=1107604
- https://bugzilla.suse.com/show_bug.cgi?id=1107609
- https://bugzilla.suse.com/show_bug.cgi?id=1107612
- https://bugzilla.suse.com/show_bug.cgi?id=1107616
- https://bugzilla.suse.com/show_bug.cgi?id=1107619
- https://bugzilla.suse.com/show_bug.cgi?id=1108282
- https://bugzilla.suse.com/show_bug.cgi?id=1108283