SUSE-SU-2018:0880-1: moderate: Security update for ImageMagick
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Apr 5 13:10:58 MDT 2018
SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0880-1
Rating: moderate
References: #1043290 #1050087 #1056434 #1058630 #1059735
#1066168 #1066170 #1082283 #1082291 #1082348
#1082362 #1082792 #1084060 #1086011
Cross-References: CVE-2017-11524 CVE-2017-12691 CVE-2017-12692
CVE-2017-12693 CVE-2017-13768 CVE-2017-14314
CVE-2017-14343 CVE-2017-14505 CVE-2017-15016
CVE-2017-15017 CVE-2017-16352 CVE-2017-16353
CVE-2017-18219 CVE-2017-9500 CVE-2018-7443
CVE-2018-8804
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that fixes 16 vulnerabilities is now available.
Description:
This update for ImageMagick fixes several issues.
These security issues were fixed:
- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to
cause a denial of service (double free and application crash) or
possibly have unspecified other impact via a crafted file (bsc#1086011)
- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause
a denial of service (assertion failure and application exit) via a
crafted file (bsc#1050087)
- CVE-2017-18219: Prevent allocation failure in the function
ReadOnePNGImage, which allowed attackers to cause a denial of service
via a crafted file that triggers an attempt at a large png_pixels array
allocation (bsc#1084060).
- CVE-2017-9500: Prevent assertion failure in the function
ResetImageProfileIterator, which allowed attackers to cause a denial of
service via a crafted file (bsc#1043290)
- CVE-2017-16353: Prevent memory information disclosure in the
DescribeImage function caused by a heap-based buffer over-read. The
portion of the code containing the vulnerability is responsible for
printing the IPTC Profile information contained in the image. This
vulnerability can be triggered with a specially crafted MIFF file. There
is an out-of-bounds buffer dereference because certain increments were
never checked (bsc#1066170)
- CVE-2017-16352: Prevent a heap-based buffer overflow in the "Display
visual image directory" feature of the DescribeImage() function. One
possible way to trigger the vulnerability is to run the identify command
on a specially crafted MIFF format file with the verbose flag
(bsc#1066168)
- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that
allowed remote attackers to cause a denial of service (DrawDashPolygon
heap-based buffer over-read and application crash) via a crafted file
(bsc#1058630)
- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage
function that allowed an attacker to perform denial of service by
sending a crafted image file (bsc#1056434)
- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers
to perform Denial of Service (NULL pointer dereference and application
crash in AcquireQuantumMemory within MagickCore/memory.c) by providing a
crafted Image File as input (bsc#1059735)
- CVE-2018-7443: The ReadTIFFImage function did not properly validate the
amount of image data in a file, which allowed remote attackers to cause
a denial of service (memory allocation failure in the
AcquireMagickMemory function in MagickCore/memory.c) (bsc#1082792)
- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in
ReadEnhMetaFile allowing for denial of service (bsc#1082291)
- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in
ReadOneMNGImage allowing for denial of service (bsc#1082283)
- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to
cause a denial of service (memory consumption) via a crafted VIFF file
(bsc#1082362)
- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to
cause a denial of service (memory consumption) via a crafted BMP file
(bsc#1082348)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-ImageMagick-13549=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-ImageMagick-13549=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-ImageMagick-13549=1
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
ImageMagick-6.4.3.6-78.40.1
ImageMagick-devel-6.4.3.6-78.40.1
libMagick++-devel-6.4.3.6-78.40.1
libMagick++1-6.4.3.6-78.40.1
libMagickWand1-6.4.3.6-78.40.1
perl-PerlMagick-6.4.3.6-78.40.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):
libMagickWand1-32bit-6.4.3.6-78.40.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
libMagickCore1-6.4.3.6-78.40.1
- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):
libMagickCore1-32bit-6.4.3.6-78.40.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
ImageMagick-debuginfo-6.4.3.6-78.40.1
ImageMagick-debugsource-6.4.3.6-78.40.1
References:
https://www.suse.com/security/cve/CVE-2017-11524.html
https://www.suse.com/security/cve/CVE-2017-12691.html
https://www.suse.com/security/cve/CVE-2017-12692.html
https://www.suse.com/security/cve/CVE-2017-12693.html
https://www.suse.com/security/cve/CVE-2017-13768.html
https://www.suse.com/security/cve/CVE-2017-14314.html
https://www.suse.com/security/cve/CVE-2017-14343.html
https://www.suse.com/security/cve/CVE-2017-14505.html
https://www.suse.com/security/cve/CVE-2017-15016.html
https://www.suse.com/security/cve/CVE-2017-15017.html
https://www.suse.com/security/cve/CVE-2017-16352.html
https://www.suse.com/security/cve/CVE-2017-16353.html
https://www.suse.com/security/cve/CVE-2017-18219.html
https://www.suse.com/security/cve/CVE-2017-9500.html
https://www.suse.com/security/cve/CVE-2018-7443.html
https://www.suse.com/security/cve/CVE-2018-8804.html
https://bugzilla.suse.com/1043290
https://bugzilla.suse.com/1050087
https://bugzilla.suse.com/1056434
https://bugzilla.suse.com/1058630
https://bugzilla.suse.com/1059735
https://bugzilla.suse.com/1066168
https://bugzilla.suse.com/1066170
https://bugzilla.suse.com/1082283
https://bugzilla.suse.com/1082291
https://bugzilla.suse.com/1082348
https://bugzilla.suse.com/1082362
https://bugzilla.suse.com/1082792
https://bugzilla.suse.com/1084060
https://bugzilla.suse.com/1086011
More information about the sle-security-updates
mailing list