SUSE-SU-2019:1019-1: moderate: Security update for ImageMagick

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Apr 24 09:51:42 MDT 2019


   SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:1019-1
Rating:             moderate
References:         #1122033 #1130330 #1131317 #1132054 #1132060 
                    
Cross-References:   CVE-2019-10650 CVE-2019-11007 CVE-2019-11008
                    CVE-2019-9956
Affected Products:
                    SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
                    SUSE Linux Enterprise Module for Development Tools 15
                    SUSE Linux Enterprise Module for Desktop Applications 15
______________________________________________________________________________

   An update that solves four vulnerabilities and has one
   errata is now available.

Description:

   This update for ImageMagick fixes the following issues:

   Security issues fixed:

   - CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel()
     (bsc#1130330).
   - CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage()
     (bsc#1131317).
   - CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage()
     (bsc#1132060).
   - CVE-2019-11008: Fixed a heap-based buffer overflow in WriteXWDImage()
     (bsc#1132054).

   - Added extra -config- packages with Postscript/EPS/PDF readers still
     enabled.

     Removing the PS decoders is used to harden ImageMagick against security
   issues within ghostscript. Enabling them might impact security.
   (bsc#1122033)

     These are two packages that can be selected:

     - ImageMagick-config-7-SUSE: This has the PS decoders disabled.
     - ImageMagick-config-7-upstream: This has the PS decoders enabled.

     Depending on your local needs install either one of them. The default is
   the -SUSE configuration.


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:

      zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-1019=1

   - SUSE Linux Enterprise Module for Development Tools 15:

      zypper in -t patch SUSE-SLE-Module-Development-Tools-15-2019-1019=1

   - SUSE Linux Enterprise Module for Desktop Applications 15:

      zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2019-1019=1



Package List:

   - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (aarch64 ppc64le s390x x86_64):

      ImageMagick-debuginfo-7.0.7.34-3.54.3
      ImageMagick-debugsource-7.0.7.34-3.54.3
      ImageMagick-extra-7.0.7.34-3.54.3
      ImageMagick-extra-debuginfo-7.0.7.34-3.54.3

   - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (noarch):

      ImageMagick-doc-7.0.7.34-3.54.3

   - SUSE Linux Enterprise Module for Development Tools 15 (aarch64 ppc64le s390x x86_64):

      ImageMagick-debuginfo-7.0.7.34-3.54.3
      ImageMagick-debugsource-7.0.7.34-3.54.3
      perl-PerlMagick-7.0.7.34-3.54.3
      perl-PerlMagick-debuginfo-7.0.7.34-3.54.3

   - SUSE Linux Enterprise Module for Desktop Applications 15 (aarch64 ppc64le s390x x86_64):

      ImageMagick-7.0.7.34-3.54.3
      ImageMagick-config-7-SUSE-7.0.7.34-3.54.3
      ImageMagick-config-7-upstream-7.0.7.34-3.54.3
      ImageMagick-debuginfo-7.0.7.34-3.54.3
      ImageMagick-debugsource-7.0.7.34-3.54.3
      ImageMagick-devel-7.0.7.34-3.54.3
      libMagick++-7_Q16HDRI4-7.0.7.34-3.54.3
      libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.54.3
      libMagick++-devel-7.0.7.34-3.54.3
      libMagickCore-7_Q16HDRI6-7.0.7.34-3.54.3
      libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.54.3
      libMagickWand-7_Q16HDRI6-7.0.7.34-3.54.3
      libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.54.3


References:

   https://www.suse.com/security/cve/CVE-2019-10650.html
   https://www.suse.com/security/cve/CVE-2019-11007.html
   https://www.suse.com/security/cve/CVE-2019-11008.html
   https://www.suse.com/security/cve/CVE-2019-9956.html
   https://bugzilla.suse.com/1122033
   https://bugzilla.suse.com/1130330
   https://bugzilla.suse.com/1131317
   https://bugzilla.suse.com/1132054
   https://bugzilla.suse.com/1132060



More information about the sle-security-updates mailing list