SUSE-SU-2017:0518-1: moderate: Security update for GraphicsMagick

sle-updates at lists.suse.com sle-updates at lists.suse.com
Mon Feb 20 07:10:58 MST 2017


   SUSE Security Update: Security update for GraphicsMagick
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:0518-1
Rating:             moderate
References:         #1017310 #1017311 #1017312 #1017313 #1017318 
                    #1017321 #1017322 #1017324 #1017326 #1020443 
                    #1020448 
Cross-References:   CVE-2016-10048 CVE-2016-10049 CVE-2016-10050
                    CVE-2016-10051 CVE-2016-10059 CVE-2016-10064
                    CVE-2016-10065 CVE-2016-10068 CVE-2016-10070
                    CVE-2016-10146 CVE-2017-5511
Affected Products:
                    SUSE Studio Onsite 1.3
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that fixes 11 vulnerabilities is now available.

Description:


   This update for GraphicsMagick fixes several issues.

   These security issues were fixed:

   - CVE-2016-10048: Arbitrary module could have been load because relative
     path were not escaped (bsc#1017310).
   - CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to
     a incorrect length calculation (bsc#1017311).
   - CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer
     due to a missing offset check (bsc#1017312).
   - CVE-2016-10051: Fixed use after free when reading PWP files
     (bsc#1017313).
   - CVE-2016-10059: Unchecked calculation when reading TIFF files could have
     lead to a buffer overflow (bsc#1017318).
   - CVE-2016-10064: Improved checks for buffer overflow when reading TIFF
     files (bsc#1017321).
   - CVE-2016-10065: Unchecked calculations when reading VIFF files could
     have lead to out of bound reads (bsc#1017322).
   - CVE-2016-10068: Prevent NULL pointer access when using the MSL
     interpreter (bsc#1017324).
   - CVE-2016-10070: Prevent allocating the wrong amount of memory when
     reading mat files (bsc#1017326).
   - CVE-2016-10146: Captions and labels were handled incorrectly, causing a
     memory leak that could have lead to DoS (bsc#1020443).
   - CVE-2017-5511: A missing cast when reading PSD files could have caused
     memory corruption by a heap overflow (bsc#1020448).


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Studio Onsite 1.3:

      zypper in -t patch slestso13-GraphicsMagick-12994=1

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-GraphicsMagick-12994=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-GraphicsMagick-12994=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Studio Onsite 1.3 (x86_64):

      GraphicsMagick-1.2.5-4.62.1
      libGraphicsMagick2-1.2.5-4.62.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      GraphicsMagick-1.2.5-4.62.1
      libGraphicsMagick2-1.2.5-4.62.1
      perl-GraphicsMagick-1.2.5-4.62.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      GraphicsMagick-debuginfo-1.2.5-4.62.1
      GraphicsMagick-debugsource-1.2.5-4.62.1


References:

   https://www.suse.com/security/cve/CVE-2016-10048.html
   https://www.suse.com/security/cve/CVE-2016-10049.html
   https://www.suse.com/security/cve/CVE-2016-10050.html
   https://www.suse.com/security/cve/CVE-2016-10051.html
   https://www.suse.com/security/cve/CVE-2016-10059.html
   https://www.suse.com/security/cve/CVE-2016-10064.html
   https://www.suse.com/security/cve/CVE-2016-10065.html
   https://www.suse.com/security/cve/CVE-2016-10068.html
   https://www.suse.com/security/cve/CVE-2016-10070.html
   https://www.suse.com/security/cve/CVE-2016-10146.html
   https://www.suse.com/security/cve/CVE-2017-5511.html
   https://bugzilla.suse.com/1017310
   https://bugzilla.suse.com/1017311
   https://bugzilla.suse.com/1017312
   https://bugzilla.suse.com/1017313
   https://bugzilla.suse.com/1017318
   https://bugzilla.suse.com/1017321
   https://bugzilla.suse.com/1017322
   https://bugzilla.suse.com/1017324
   https://bugzilla.suse.com/1017326
   https://bugzilla.suse.com/1020443
   https://bugzilla.suse.com/1020448



More information about the sle-updates mailing list