Security update for ImageMagick
Announcement ID: | SUSE-SU-2021:14598-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 19 vulnerabilities can now be installed.
Description:
This update for ImageMagick fixes the following issues:
- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Point of Service 11 SP3
zypper in -t patch sleposp3-ImageMagick-14598=1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4
zypper in -t patch slessp4-ImageMagick-14598=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-ImageMagick-14598=1
Package List:
-
SUSE Linux Enterprise Point of Service 11 SP3 (i586)
- libMagickCore1-6.4.3.6-78.135.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (ppc64 s390x x86_64 i586)
- libMagickCore1-6.4.3.6-78.135.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (ppc64 s390x x86_64)
- libMagickCore1-32bit-6.4.3.6-78.135.1
-
SUSE Linux Enterprise Server 11 SP4 (ppc64 s390x x86_64 i586)
- libMagickCore1-6.4.3.6-78.135.1
-
SUSE Linux Enterprise Server 11 SP4 (ppc64 s390x x86_64)
- libMagickCore1-32bit-6.4.3.6-78.135.1
References:
- https://www.suse.com/security/cve/CVE-2020-19667.html
- https://www.suse.com/security/cve/CVE-2020-25664.html
- https://www.suse.com/security/cve/CVE-2020-25666.html
- https://www.suse.com/security/cve/CVE-2020-27751.html
- https://www.suse.com/security/cve/CVE-2020-27752.html
- https://www.suse.com/security/cve/CVE-2020-27753.html
- https://www.suse.com/security/cve/CVE-2020-27754.html
- https://www.suse.com/security/cve/CVE-2020-27755.html
- https://www.suse.com/security/cve/CVE-2020-27759.html
- https://www.suse.com/security/cve/CVE-2020-27760.html
- https://www.suse.com/security/cve/CVE-2020-27761.html
- https://www.suse.com/security/cve/CVE-2020-27763.html
- https://www.suse.com/security/cve/CVE-2020-27765.html
- https://www.suse.com/security/cve/CVE-2020-27767.html
- https://www.suse.com/security/cve/CVE-2020-27768.html
- https://www.suse.com/security/cve/CVE-2020-27769.html
- https://www.suse.com/security/cve/CVE-2020-27771.html
- https://www.suse.com/security/cve/CVE-2020-27772.html
- https://www.suse.com/security/cve/CVE-2020-27775.html
- https://bugzilla.suse.com/show_bug.cgi?id=1179103
- https://bugzilla.suse.com/show_bug.cgi?id=1179202
- https://bugzilla.suse.com/show_bug.cgi?id=1179212
- https://bugzilla.suse.com/show_bug.cgi?id=1179269
- https://bugzilla.suse.com/show_bug.cgi?id=1179281
- https://bugzilla.suse.com/show_bug.cgi?id=1179311
- https://bugzilla.suse.com/show_bug.cgi?id=1179312
- https://bugzilla.suse.com/show_bug.cgi?id=1179313
- https://bugzilla.suse.com/show_bug.cgi?id=1179315
- https://bugzilla.suse.com/show_bug.cgi?id=1179321
- https://bugzilla.suse.com/show_bug.cgi?id=1179322
- https://bugzilla.suse.com/show_bug.cgi?id=1179327
- https://bugzilla.suse.com/show_bug.cgi?id=1179336
- https://bugzilla.suse.com/show_bug.cgi?id=1179338
- https://bugzilla.suse.com/show_bug.cgi?id=1179339
- https://bugzilla.suse.com/show_bug.cgi?id=1179345
- https://bugzilla.suse.com/show_bug.cgi?id=1179346
- https://bugzilla.suse.com/show_bug.cgi?id=1179347
- https://bugzilla.suse.com/show_bug.cgi?id=1179397