SUSE-SU-2018:0864-1: moderate: Security update for GraphicsMagick

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue Apr 3 13:11:08 MDT 2018


   SUSE Security Update: Security update for GraphicsMagick
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:0864-1
Rating:             moderate
References:         #1050087 #1058630 #1059735 #1066168 #1066170 
                    #1082283 #1082291 #1082348 #1084060 #1084062 
                    #1085233 
Cross-References:   CVE-2017-11524 CVE-2017-12691 CVE-2017-12693
                    CVE-2017-14314 CVE-2017-14343 CVE-2017-14505
                    CVE-2017-15016 CVE-2017-15017 CVE-2017-16352
                    CVE-2017-16353 CVE-2017-18219 CVE-2017-18220
                    CVE-2017-18230
Affected Products:
                    SUSE Studio Onsite 1.3
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that fixes 13 vulnerabilities is now available.

Description:

   This update for GraphicsMagick fixes several issues.

   These security issues were fixed:

   - CVE-2017-11524: The WriteBlob function allowed remote attackers to cause
     a denial of service (assertion failure and application exit) via a
     crafted file (bsc#1050087)
   - CVE-2017-16353: Prevent memory information disclosure in the
     DescribeImage function caused by a heap-based buffer over-read. The
     portion of the code containing the vulnerability is responsible for
     printing the IPTC Profile information contained in the image. This
     vulnerability can be triggered with a specially crafted MIFF file. There
     is an out-of-bounds buffer dereference because certain increments were
     never checked (bsc#1066170)
   - CVE-2017-16352: Prevent a heap-based buffer overflow in the "Display
     visual image directory" feature of the DescribeImage() function. One
     possible way to trigger the vulnerability is to run the identify command
     on a specially crafted MIFF format file with the verbose flag
     (bsc#1066168)
   - CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
     allowed remote attackers to cause a denial of service (DrawDashPolygon
     heap-based buffer over-read and application crash) via a crafted file
     (bsc#1058630)
   - CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers
     to perform Denial of Service (NULL pointer dereference and application
     crash in AcquireQuantumMemory within MagickCore/memory.c) by providing a
     crafted Image File as input (bsc#1059735)
   - CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
     ReadEnhMetaFile allowing for denial of service (bsc#1082291)
   - CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
     ReadOneMNGImage allowing for denial of service (bsc#1082283)
   - CVE-2017-12693: The ReadBMPImage function allowed remote attackers to
     cause a denial of service (memory consumption) via a crafted BMP file
     (bsc#1082348)
   - CVE-2017-18219: Prevent allocation failure in the function
     ReadOnePNGImage, which allowed attackers to cause a denial of service
     via a crafted file that triggers an attempt at a large png_pixels array
     allocation (bsc#1084060)
   - CVE-2017-18230: Prevent NULL pointer dereference in the function
     ReadCINEONImage, which allowed attackers to cause a denial of service
     via a crafted file (bsc#1085233).
   - CVE-2017-18220: The ReadOneJNGImage and ReadJNGImage functions allowed
     remote attackers to cause a denial of service (magick/blob.c CloseBlob
     use-after-free)
     or possibly have unspecified other impact via a crafted file
      (bsc#1084062).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Studio Onsite 1.3:

      zypper in -t patch slestso13-GraphicsMagick-13543=1

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-GraphicsMagick-13543=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-GraphicsMagick-13543=1



Package List:

   - SUSE Studio Onsite 1.3 (x86_64):

      GraphicsMagick-1.2.5-78.44.1
      libGraphicsMagick2-1.2.5-78.44.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      GraphicsMagick-1.2.5-78.44.1
      libGraphicsMagick2-1.2.5-78.44.1
      perl-GraphicsMagick-1.2.5-78.44.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      GraphicsMagick-debuginfo-1.2.5-78.44.1
      GraphicsMagick-debugsource-1.2.5-78.44.1


References:

   https://www.suse.com/security/cve/CVE-2017-11524.html
   https://www.suse.com/security/cve/CVE-2017-12691.html
   https://www.suse.com/security/cve/CVE-2017-12693.html
   https://www.suse.com/security/cve/CVE-2017-14314.html
   https://www.suse.com/security/cve/CVE-2017-14343.html
   https://www.suse.com/security/cve/CVE-2017-14505.html
   https://www.suse.com/security/cve/CVE-2017-15016.html
   https://www.suse.com/security/cve/CVE-2017-15017.html
   https://www.suse.com/security/cve/CVE-2017-16352.html
   https://www.suse.com/security/cve/CVE-2017-16353.html
   https://www.suse.com/security/cve/CVE-2017-18219.html
   https://www.suse.com/security/cve/CVE-2017-18220.html
   https://www.suse.com/security/cve/CVE-2017-18230.html
   https://bugzilla.suse.com/1050087
   https://bugzilla.suse.com/1058630
   https://bugzilla.suse.com/1059735
   https://bugzilla.suse.com/1066168
   https://bugzilla.suse.com/1066170
   https://bugzilla.suse.com/1082283
   https://bugzilla.suse.com/1082291
   https://bugzilla.suse.com/1082348
   https://bugzilla.suse.com/1084060
   https://bugzilla.suse.com/1084062
   https://bugzilla.suse.com/1085233



More information about the sle-security-updates mailing list