SUSE-SU-2018:0132-1: moderate: Security update for ImageMagick

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Thu Jan 18 07:11:32 MST 2018


   SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:0132-1
Rating:             moderate
References:         #1042948 #1047044 #1047898 #1049373 #1050120 
                    #1050606 #1051412 #1051446 #1052252 #1052468 
                    #1052550 #1052710 #1052720 #1052731 #1052732 
                    #1052771 #1055065 #1055323 #1055434 #1055855 
                    #1058082 #1058640 #1059751 #1072902 #1074122 
                    #1074123 #1074425 #1074610 #1074969 #1074973 
                    #1074975 
Cross-References:   CVE-2017-1000445 CVE-2017-1000476 CVE-2017-10800
                    CVE-2017-11141 CVE-2017-11449 CVE-2017-11529
                    CVE-2017-11644 CVE-2017-11724 CVE-2017-11751
                    CVE-2017-12430 CVE-2017-12434 CVE-2017-12564
                    CVE-2017-12642 CVE-2017-12667 CVE-2017-12670
                    CVE-2017-12672 CVE-2017-12675 CVE-2017-13060
                    CVE-2017-13146 CVE-2017-13648 CVE-2017-13658
                    CVE-2017-14249 CVE-2017-14326 CVE-2017-14533
                    CVE-2017-17680 CVE-2017-17881 CVE-2017-17882
                    CVE-2017-18022 CVE-2017-9409 CVE-2018-5246
                    CVE-2018-5247
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that fixes 31 vulnerabilities is now available.

Description:

   This update for ImageMagick fixes several issues.

   These security issues were fixed:

   - CVE-2017-12672: Fixed a memory leak vulnerability in the function
     ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
     of service (bsc#1052720).
   - CVE-2017-13060: Fixed a memory leak vulnerability in the function
     ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
     of service via a crafted file (bsc#1055065).
   - CVE-2017-11724: Fixed a memory leak vulnerability in the function
     ReadMATImage in coders/mat.c involving the quantum_info and clone_info
     data structures (bsc#1051446).
   - CVE-2017-12670: Added validation in coders/mat.c to prevent an assertion
     failure in the function DestroyImage in MagickCore/image.c, which
     allowed attackers to cause a denial of service (bsc#1052731).
   - CVE-2017-12667: Fixed a memory leak vulnerability in the function
     ReadMATImage in coders/mat.c (bsc#1052732).
   - CVE-2017-13146: Fixed a memory leak vulnerability in the function
     ReadMATImage in coders/mat.c (bsc#1055323).
   - CVE-2017-10800: Processing MATLAB images in coders/mat.c could have lead
     to a denial of service (OOM) in ReadMATImage() if the size specified for
     a MAT Object was larger than the actual amount of data (bsc#1047044)
   - CVE-2017-13648: Fixed a memory leak vulnerability in the function
     ReadMATImage in coders/mat.c (bsc#1055434).
   - CVE-2017-11141: Fixed a memory leak vulnerability in the function
     ReadMATImage in coders\mat.c that could have caused memory exhaustion
     via a crafted MAT file, related to incorrect ordering of a
     SetImageExtent call (bsc#1047898).
   - CVE-2017-11529: The ReadMATImage function in coders/mat.c allowed remote
     attackers to cause a denial of service (memory leak) via a crafted file
     (bsc#1050120).
   - CVE-2017-12564: Fixed a memory leak vulnerability in the function
     ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
     of service (bsc#1052468).
   - CVE-2017-12434: Added a missing NULL check in the function ReadMATImage
     in coders/mat.c, which allowed attackers to cause a denial of service
     (assertion failure) in DestroyImageInfo in image.c (bsc#1052550).
   - CVE-2017-12675: Added a missing check for multidimensional data
     coders/mat.c, that could have lead to a memory leak in the function
     ReadImage in MagickCore/constitute.c, which allowed attackers to cause a
     denial of service (bsc#1052710).
   - CVE-2017-14326: Fixed a memory leak vulnerability in the function
     ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
     of service via a crafted file (bsc#1058640).
   - CVE-2017-11644: Processesing a crafted file in convert could have lead
     to a memory leak in the ReadMATImage() function in coders/mat.c
     (bsc#1050606).
   - CVE-2017-13658: Added a missing NULL check in the ReadMATImage function
     in coders/mat.c, which could have lead to a denial of service (assertion
     failure and application exit) in the DestroyImageInfo function in
     MagickCore/image.c (bsc#1055855).
   - CVE-2017-14533: Fixed a memory leak vulnerability in the function
     ReadMATImage in coders/mat.c (bsc#1059751).
   - CVE-2017-17881: Fixed a memory leak vulnerability in the function
     ReadMATImage in coders/mat.c, which allowed attackers to cause a denial
     of service via a crafted MAT image file (bsc#1074123).
   - CVE-2017-1000476: Prevent CPU exhaustion in the function ReadDDSInfo in
     coders/dds.c, which allowed attackers to cause a denial of service
     (bsc#1074610).
   - CVE-2017-9409: Fixed a memory leak vulnerability in the function
     ReadMPCImage in mpc.c, which allowed attackers to cause a denial of
     service via a crafted file (bsc#1042948).
   - CVE-2017-11449: coders/mpc did not enable seekable streams and thus
     could not validate blob sizes, which allowed remote attackers to cause a
     denial of service (application crash) or possibly have unspecified other
     impact via an image received from stdin (bsc#1049373)
   - CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
     coders/mpc.c allowed attackers to cause DoS (bsc#1052252)
   - CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
     coders\mpc.c via crafted file allowing for DoS (bsc#1052771)
   - CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c
     that lead to a division by zero in GetPixelCacheTileSize in
     MagickCore/cache.c allowed remote attackers to cause a denial of service
     via a crafted file (bsc#1058082)
   - CVE-2017-1000445: Added a NUL pointer check in the MagickCore component
     that might have lead to denial of service  (bsc#1074425).
   - CVE-2017-11751: Fixed a memory leak vulnerability in the function
     WritePICONImage in coders/xpm.c that allowed remote attackers to cause a
     denial
     of service via a crafted file (bsc#1051412).
   - CVE-2017-17680: Fixed a memory leak vulnerability in the function
     ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial
     of service via a crafted xpm image file (bsc#1072902).
   - CVE-2017-17882: Fixed a memory leak vulnerability in the function
     ReadXPMImage in coders/xpm.c, which allowed attackers to cause a denial
     of service via a crafted XPM image file (bsc#1074122).
   - CVE-2018-5246: Fixed memory leak vulnerability in ReadPATTERNImage in
     coders/pattern.c (bsc#1074973).
   - CVE-2017-18022: Fixed memory leak vulnerability in MontageImageCommand
     in MagickWand/montage.c (bsc#1074975)
   - CVE-2018-5247: Fixed memory leak vulnerability in ReadRLAImage in
     coders/rla.c (bsc#1074969)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-ImageMagick-13422=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-ImageMagick-13422=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-ImageMagick-13422=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      ImageMagick-6.4.3.6-7.78.22.1
      ImageMagick-devel-6.4.3.6-7.78.22.1
      libMagick++-devel-6.4.3.6-7.78.22.1
      libMagick++1-6.4.3.6-7.78.22.1
      libMagickWand1-6.4.3.6-7.78.22.1
      perl-PerlMagick-6.4.3.6-7.78.22.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):

      libMagickWand1-32bit-6.4.3.6-7.78.22.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libMagickCore1-6.4.3.6-7.78.22.1

   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

      libMagickCore1-32bit-6.4.3.6-7.78.22.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      ImageMagick-debuginfo-6.4.3.6-7.78.22.1
      ImageMagick-debugsource-6.4.3.6-7.78.22.1


References:

   https://www.suse.com/security/cve/CVE-2017-1000445.html
   https://www.suse.com/security/cve/CVE-2017-1000476.html
   https://www.suse.com/security/cve/CVE-2017-10800.html
   https://www.suse.com/security/cve/CVE-2017-11141.html
   https://www.suse.com/security/cve/CVE-2017-11449.html
   https://www.suse.com/security/cve/CVE-2017-11529.html
   https://www.suse.com/security/cve/CVE-2017-11644.html
   https://www.suse.com/security/cve/CVE-2017-11724.html
   https://www.suse.com/security/cve/CVE-2017-11751.html
   https://www.suse.com/security/cve/CVE-2017-12430.html
   https://www.suse.com/security/cve/CVE-2017-12434.html
   https://www.suse.com/security/cve/CVE-2017-12564.html
   https://www.suse.com/security/cve/CVE-2017-12642.html
   https://www.suse.com/security/cve/CVE-2017-12667.html
   https://www.suse.com/security/cve/CVE-2017-12670.html
   https://www.suse.com/security/cve/CVE-2017-12672.html
   https://www.suse.com/security/cve/CVE-2017-12675.html
   https://www.suse.com/security/cve/CVE-2017-13060.html
   https://www.suse.com/security/cve/CVE-2017-13146.html
   https://www.suse.com/security/cve/CVE-2017-13648.html
   https://www.suse.com/security/cve/CVE-2017-13658.html
   https://www.suse.com/security/cve/CVE-2017-14249.html
   https://www.suse.com/security/cve/CVE-2017-14326.html
   https://www.suse.com/security/cve/CVE-2017-14533.html
   https://www.suse.com/security/cve/CVE-2017-17680.html
   https://www.suse.com/security/cve/CVE-2017-17881.html
   https://www.suse.com/security/cve/CVE-2017-17882.html
   https://www.suse.com/security/cve/CVE-2017-18022.html
   https://www.suse.com/security/cve/CVE-2017-9409.html
   https://www.suse.com/security/cve/CVE-2018-5246.html
   https://www.suse.com/security/cve/CVE-2018-5247.html
   https://bugzilla.suse.com/1042948
   https://bugzilla.suse.com/1047044
   https://bugzilla.suse.com/1047898
   https://bugzilla.suse.com/1049373
   https://bugzilla.suse.com/1050120
   https://bugzilla.suse.com/1050606
   https://bugzilla.suse.com/1051412
   https://bugzilla.suse.com/1051446
   https://bugzilla.suse.com/1052252
   https://bugzilla.suse.com/1052468
   https://bugzilla.suse.com/1052550
   https://bugzilla.suse.com/1052710
   https://bugzilla.suse.com/1052720
   https://bugzilla.suse.com/1052731
   https://bugzilla.suse.com/1052732
   https://bugzilla.suse.com/1052771
   https://bugzilla.suse.com/1055065
   https://bugzilla.suse.com/1055323
   https://bugzilla.suse.com/1055434
   https://bugzilla.suse.com/1055855
   https://bugzilla.suse.com/1058082
   https://bugzilla.suse.com/1058640
   https://bugzilla.suse.com/1059751
   https://bugzilla.suse.com/1072902
   https://bugzilla.suse.com/1074122
   https://bugzilla.suse.com/1074123
   https://bugzilla.suse.com/1074425
   https://bugzilla.suse.com/1074610
   https://bugzilla.suse.com/1074969
   https://bugzilla.suse.com/1074973
   https://bugzilla.suse.com/1074975



More information about the sle-security-updates mailing list