SUSE-SU-2018:0055-1: moderate: Security update for ImageMagick
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Jan 9 13:22:22 MST 2018
SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0055-1
Rating: moderate
References: #1042948 #1049373 #1051412 #1052252 #1052771
#1058082 #1072902 #1074122 #1074425 #1074610
Cross-References: CVE-2017-1000445 CVE-2017-1000476 CVE-2017-11449
CVE-2017-11751 CVE-2017-12430 CVE-2017-12642
CVE-2017-14249 CVE-2017-17680 CVE-2017-17882
CVE-2017-9409
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP3
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP3
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes 10 vulnerabilities is now available.
Description:
This update for ImageMagick fixes several issues.
These security issues were fixed:
- CVE-2017-1000476: A CPU exhaustion vulnerability was found in the
function ReadDDSInfo in coders/dds.c, which allowed attackers to cause a
denial of service (bsc#1074610).
- CVE-2017-9409: The ReadMPCImage function in mpc.c allowed attackers to
cause a denial of service (memory leak) via a crafted file (bsc#1042948).
- CVE-2017-1000445: A NULL pointer dereference in the MagickCore component
might have lead to denial of service (bsc#1074425).
- CVE-2017-17680: Prevent a memory leak in the function ReadXPMImage in
coders/xpm.c, which allowed attackers to cause a denial of service via a
crafted XPM image file (a different vulnerability than CVE-2017-17882)
(bsc#1072902).
- CVE-2017-17882: Prevent a memory leak in the function ReadXPMImage in
coders/xpm.c, which allowed attackers to cause a denial of service via a
crafted XPM image file (a different vulnerability than CVE-2017-17680)
(bsc#1074122).
- CVE-2017-11449: coders/mpc did not enable seekable streams and thus
could not validate blob sizes, which allowed remote attackers to cause a
denial of service (application crash) or possibly have unspecified other
impact via an image received from stdin (bsc#1049373).
- CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
coders/mpc.c allowed attackers to cause DoS (bsc#1052252).
- CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
coders\mpc.c via crafted file allowing for DoS (bsc#1052771).
- CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c
that lead to a division by zero in GetPixelCacheTileSize in
MagickCore/cache.c allowed remote attackers to cause a denial of service
via a crafted file (bsc#1058082).
- Prevent memory leak via crafted file in pwp.c allowing for DoS
(bsc#1051412)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP3:
zypper in -t patch SUSE-SLE-WE-12-SP3-2018-41=1
- SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2018-41=1
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-41=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-41=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2018-41=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-41=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-41=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-41=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2018-41=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64):
ImageMagick-6.8.8.1-71.23.1
ImageMagick-debuginfo-6.8.8.1-71.23.1
ImageMagick-debugsource-6.8.8.1-71.23.1
libMagick++-6_Q16-3-6.8.8.1-71.23.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.23.1
- SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
ImageMagick-6.8.8.1-71.23.1
ImageMagick-debuginfo-6.8.8.1-71.23.1
ImageMagick-debugsource-6.8.8.1-71.23.1
libMagick++-6_Q16-3-6.8.8.1-71.23.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.23.1
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
ImageMagick-6.8.8.1-71.23.1
ImageMagick-debuginfo-6.8.8.1-71.23.1
ImageMagick-debugsource-6.8.8.1-71.23.1
ImageMagick-devel-6.8.8.1-71.23.1
libMagick++-6_Q16-3-6.8.8.1-71.23.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
libMagick++-devel-6.8.8.1-71.23.1
perl-PerlMagick-6.8.8.1-71.23.1
perl-PerlMagick-debuginfo-6.8.8.1-71.23.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
ImageMagick-6.8.8.1-71.23.1
ImageMagick-debuginfo-6.8.8.1-71.23.1
ImageMagick-debugsource-6.8.8.1-71.23.1
ImageMagick-devel-6.8.8.1-71.23.1
libMagick++-6_Q16-3-6.8.8.1-71.23.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
libMagick++-devel-6.8.8.1-71.23.1
perl-PerlMagick-6.8.8.1-71.23.1
perl-PerlMagick-debuginfo-6.8.8.1-71.23.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
ImageMagick-debuginfo-6.8.8.1-71.23.1
ImageMagick-debugsource-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
libMagickWand-6_Q16-1-6.8.8.1-71.23.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
ImageMagick-debuginfo-6.8.8.1-71.23.1
ImageMagick-debugsource-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
libMagickWand-6_Q16-1-6.8.8.1-71.23.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
ImageMagick-debuginfo-6.8.8.1-71.23.1
ImageMagick-debugsource-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
libMagickWand-6_Q16-1-6.8.8.1-71.23.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
ImageMagick-6.8.8.1-71.23.1
ImageMagick-debuginfo-6.8.8.1-71.23.1
ImageMagick-debugsource-6.8.8.1-71.23.1
libMagick++-6_Q16-3-6.8.8.1-71.23.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
libMagickWand-6_Q16-1-6.8.8.1-71.23.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
ImageMagick-6.8.8.1-71.23.1
ImageMagick-debuginfo-6.8.8.1-71.23.1
ImageMagick-debugsource-6.8.8.1-71.23.1
libMagick++-6_Q16-3-6.8.8.1-71.23.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.23.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
libMagickWand-6_Q16-1-6.8.8.1-71.23.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
References:
https://www.suse.com/security/cve/CVE-2017-1000445.html
https://www.suse.com/security/cve/CVE-2017-1000476.html
https://www.suse.com/security/cve/CVE-2017-11449.html
https://www.suse.com/security/cve/CVE-2017-11751.html
https://www.suse.com/security/cve/CVE-2017-12430.html
https://www.suse.com/security/cve/CVE-2017-12642.html
https://www.suse.com/security/cve/CVE-2017-14249.html
https://www.suse.com/security/cve/CVE-2017-17680.html
https://www.suse.com/security/cve/CVE-2017-17882.html
https://www.suse.com/security/cve/CVE-2017-9409.html
https://bugzilla.suse.com/1042948
https://bugzilla.suse.com/1049373
https://bugzilla.suse.com/1051412
https://bugzilla.suse.com/1052252
https://bugzilla.suse.com/1052771
https://bugzilla.suse.com/1058082
https://bugzilla.suse.com/1072902
https://bugzilla.suse.com/1074122
https://bugzilla.suse.com/1074425
https://bugzilla.suse.com/1074610
More information about the sle-security-updates
mailing list