Security update for ImageMagick
Announcement ID: | SUSE-SU-2019:1033-2 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 13 vulnerabilities and has one security fix can now be installed.
Description:
This update for ImageMagick fixes the following issues:
Security issues fixed:
- CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel() (bsc#1130330).
- CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage() (bsc#1131317).
- CVE-2019-7175: Fixed multiple memory leaks in DecodeImage function (bsc#1128649).
- CVE-2018-20467: Fixed infinite loop in coders/bmp.c (bsc#1120381).
- CVE-2019-7398: Fixed a memory leak in the function WriteDIBImage (bsc#1124365).
- CVE-2019-7397: Fixed a memory leak in the function WritePDFImage (bsc#1124366).
- CVE-2019-7395: Fixed a memory leak in the function WritePSDChannel (bsc#1124368).
- CVE-2018-16413: Fixed a heap-based buffer over-read in PushShortPixel() (bsc#1106989).
- CVE-2018-16412: Fixed a heap-based buffer over-read in ParseImageResourceBlocks() (bsc#1106996).
- CVE-2018-16644: Fixed a regression in dcm coder (bsc#1107609).
- CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage() (bsc#1132060).
- CVE-2019-11008: Fixed a heap-based buffer overflow in WriteXWDImage() (bsc#1132054).
-
CVE-2019-11009: Fixed a heap-based buffer over-read in ReadXWDImage() (bsc#1132053).
-
Added extra -config- packages with Postscript/EPS/PDF readers still enabled.
Removing the PS decoders is used to harden ImageMagick against security issues within ghostscript. Enabling them might impact security. (bsc#1122033)
These are two packages that can be selected:
- ImageMagick-config-6-SUSE: This has the PS decoders disabled.
- ImageMagick-config-6-upstream: This has the PS decoders enabled.
Depending on your local needs install either one of them. The default is the -SUSE configuration.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1
zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-1033=1
Package List:
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (x86_64)
- libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.108.1
- ImageMagick-debuginfo-6.8.8.1-71.108.1
- libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.108.1
- ImageMagick-config-6-upstream-6.8.8.1-71.108.1
- ImageMagick-config-6-SUSE-6.8.8.1-71.108.1
- libMagickCore-6_Q16-1-6.8.8.1-71.108.1
- libMagickWand-6_Q16-1-6.8.8.1-71.108.1
- ImageMagick-debugsource-6.8.8.1-71.108.1
References:
- https://www.suse.com/security/cve/CVE-2018-16412.html
- https://www.suse.com/security/cve/CVE-2018-16413.html
- https://www.suse.com/security/cve/CVE-2018-16644.html
- https://www.suse.com/security/cve/CVE-2018-20467.html
- https://www.suse.com/security/cve/CVE-2019-10650.html
- https://www.suse.com/security/cve/CVE-2019-11007.html
- https://www.suse.com/security/cve/CVE-2019-11008.html
- https://www.suse.com/security/cve/CVE-2019-11009.html
- https://www.suse.com/security/cve/CVE-2019-7175.html
- https://www.suse.com/security/cve/CVE-2019-7395.html
- https://www.suse.com/security/cve/CVE-2019-7397.html
- https://www.suse.com/security/cve/CVE-2019-7398.html
- https://www.suse.com/security/cve/CVE-2019-9956.html
- https://bugzilla.suse.com/show_bug.cgi?id=1106989
- https://bugzilla.suse.com/show_bug.cgi?id=1106996
- https://bugzilla.suse.com/show_bug.cgi?id=1107609
- https://bugzilla.suse.com/show_bug.cgi?id=1120381
- https://bugzilla.suse.com/show_bug.cgi?id=1122033
- https://bugzilla.suse.com/show_bug.cgi?id=1124365
- https://bugzilla.suse.com/show_bug.cgi?id=1124366
- https://bugzilla.suse.com/show_bug.cgi?id=1124368
- https://bugzilla.suse.com/show_bug.cgi?id=1128649
- https://bugzilla.suse.com/show_bug.cgi?id=1130330
- https://bugzilla.suse.com/show_bug.cgi?id=1131317
- https://bugzilla.suse.com/show_bug.cgi?id=1132053
- https://bugzilla.suse.com/show_bug.cgi?id=1132054
- https://bugzilla.suse.com/show_bug.cgi?id=1132060