SUSE-SU-2018:0486-1: moderate: Security update for ImageMagick

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue Feb 20 07:07:51 MST 2018


   SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:0486-1
Rating:             moderate
References:         #1042824 #1048110 #1049374 #1049375 #1050048 
                    #1050617 #1050669 #1052207 #1052248 #1052251 
                    #1052254 #1052472 #1052688 #1052711 #1052747 
                    #1052750 #1052761 #1055069 #1055229 #1058009 
                    #1074119 #1076182 #1078433 
Cross-References:   CVE-2017-11166 CVE-2017-11448 CVE-2017-11450
                    CVE-2017-11537 CVE-2017-11637 CVE-2017-11638
                    CVE-2017-11642 CVE-2017-12418 CVE-2017-12427
                    CVE-2017-12429 CVE-2017-12432 CVE-2017-12566
                    CVE-2017-12654 CVE-2017-12664 CVE-2017-12665
                    CVE-2017-12668 CVE-2017-12674 CVE-2017-13058
                    CVE-2017-13131 CVE-2017-14224 CVE-2017-17885
                    CVE-2017-18028 CVE-2017-9407 CVE-2018-6405
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that fixes 24 vulnerabilities is now available.

Description:

   This update for ImageMagick fixes the following issues:

   - CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c
     allowed attackers to cause a denial of service (memory leak) via a
     crafted file.  (bsc#1042824)
   - CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in
     ImageMagick allowed remote attackers to obtain sensitive information
     from uninitialized memory locations via a crafted file.  (bsc#1049375)
   - CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed
     (bsc#1049374)
   - CVE-2017-11537: When ImageMagick processed a crafted file in convert, it
     can lead to a Floating Point Exception (FPE) in the WritePALMImage()
     function in coders/palm.c, related to an incorrect bits-per-pixel
     calculation.  (bsc#1050048)
   - CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and
     format8BIM functions in coders/meta.c, related to the WriteImage
     function in MagickCore/constitute.c.  (bsc#1052207)
   - CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was
     found in the function ReadPCXImage in coders/pcx.c, which allowed
     attackers to cause a denial of service.  (bsc#1052254)
   - CVE-2017-12654: The ReadPICTImage function in coders/pict.c in
     ImageMagick allowed attackers to cause a denial of service (memory leak)
     via a crafted file.  (bsc#1052761)
   - CVE-2017-12664: ImageMagick had a memory leak vulnerability in
     WritePALMImage in coders/palm.c.  (bsc#1052750)
   - CVE-2017-12665: ImageMagick had a memory leak vulnerability in
     WritePICTImage in coders/pict.c.  (bsc#1052747)
   - CVE-2017-12668: ImageMagick had a memory leak vulnerability in
     WritePCXImage in coders/pcx.c. (bsc#1052688)
   - CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in
     the function WritePCXImage in coders/pcx.c, which allowed attackers to
     cause a denial of service via a crafted file.  (bsc#1055069)
   - CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in
     coders/pcx.c  could lead to  denial of service or code execution.
     (bsc#1058009)
   - CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in
     the function ReadPICTImage in coders/pict.c, which allowed attackers to
     cause a denial of service via a crafted PICT image file. (bsc#1074119)
   - CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in
     coders/tiff.c was fixed. (bsc#1076182)
   - CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in
     ImageMagick, each redmap, greenmap, and bluemap variable can be
     overwritten by a new pointer. The previous pointer is lost, which leads
     to a memory leak. This allowed remote attackers to cause a denial of
     service. (bsc#1078433)
   - CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers
     to cause a DoS (bsc#1052248)
   - CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could
     have allowed attackers to cause DoS (bsc#1052472)
   - CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in
     theWriteMAPImage() in coders/map.c was fixed which could lead to a crash
     (bsc#1050617)
   - CVE-2017-13131: A memory leak vulnerability was found in thefunction
     ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial
     of service (memory consumption in NewL (bsc#1055229)
   - CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have
     caused memory exhaustion via a crafted length (bsc#1048110)
   - CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was
     fixed, which allowed attackers to cause DoS (bsc#1052711)
   - CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in
     coders/miff.c was fixed, which allowed attackers to cause DoS
     (bsc#1052251)
   - CVE-2017-11637: A NULL pointer dereference in WritePCLImage() in
     coders/pcl.c was fixed which could lead to a crash (bsc#1050669)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-ImageMagick-13476=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-ImageMagick-13476=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-ImageMagick-13476=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      ImageMagick-6.4.3.6-7.78.34.1
      ImageMagick-devel-6.4.3.6-7.78.34.1
      libMagick++-devel-6.4.3.6-7.78.34.1
      libMagick++1-6.4.3.6-7.78.34.1
      libMagickWand1-6.4.3.6-7.78.34.1
      perl-PerlMagick-6.4.3.6-7.78.34.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):

      libMagickWand1-32bit-6.4.3.6-7.78.34.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libMagickCore1-6.4.3.6-7.78.34.1

   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

      libMagickCore1-32bit-6.4.3.6-7.78.34.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      ImageMagick-debuginfo-6.4.3.6-7.78.34.1
      ImageMagick-debugsource-6.4.3.6-7.78.34.1


References:

   https://www.suse.com/security/cve/CVE-2017-11166.html
   https://www.suse.com/security/cve/CVE-2017-11448.html
   https://www.suse.com/security/cve/CVE-2017-11450.html
   https://www.suse.com/security/cve/CVE-2017-11537.html
   https://www.suse.com/security/cve/CVE-2017-11637.html
   https://www.suse.com/security/cve/CVE-2017-11638.html
   https://www.suse.com/security/cve/CVE-2017-11642.html
   https://www.suse.com/security/cve/CVE-2017-12418.html
   https://www.suse.com/security/cve/CVE-2017-12427.html
   https://www.suse.com/security/cve/CVE-2017-12429.html
   https://www.suse.com/security/cve/CVE-2017-12432.html
   https://www.suse.com/security/cve/CVE-2017-12566.html
   https://www.suse.com/security/cve/CVE-2017-12654.html
   https://www.suse.com/security/cve/CVE-2017-12664.html
   https://www.suse.com/security/cve/CVE-2017-12665.html
   https://www.suse.com/security/cve/CVE-2017-12668.html
   https://www.suse.com/security/cve/CVE-2017-12674.html
   https://www.suse.com/security/cve/CVE-2017-13058.html
   https://www.suse.com/security/cve/CVE-2017-13131.html
   https://www.suse.com/security/cve/CVE-2017-14224.html
   https://www.suse.com/security/cve/CVE-2017-17885.html
   https://www.suse.com/security/cve/CVE-2017-18028.html
   https://www.suse.com/security/cve/CVE-2017-9407.html
   https://www.suse.com/security/cve/CVE-2018-6405.html
   https://bugzilla.suse.com/1042824
   https://bugzilla.suse.com/1048110
   https://bugzilla.suse.com/1049374
   https://bugzilla.suse.com/1049375
   https://bugzilla.suse.com/1050048
   https://bugzilla.suse.com/1050617
   https://bugzilla.suse.com/1050669
   https://bugzilla.suse.com/1052207
   https://bugzilla.suse.com/1052248
   https://bugzilla.suse.com/1052251
   https://bugzilla.suse.com/1052254
   https://bugzilla.suse.com/1052472
   https://bugzilla.suse.com/1052688
   https://bugzilla.suse.com/1052711
   https://bugzilla.suse.com/1052747
   https://bugzilla.suse.com/1052750
   https://bugzilla.suse.com/1052761
   https://bugzilla.suse.com/1055069
   https://bugzilla.suse.com/1055229
   https://bugzilla.suse.com/1058009
   https://bugzilla.suse.com/1074119
   https://bugzilla.suse.com/1076182
   https://bugzilla.suse.com/1078433



More information about the sle-security-updates mailing list