openSUSE Security Update: Security update for ImageMagick ______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:3027-1 Rating: moderate References: #1011130 #1011136 Cross-References: CVE-2016-9556 CVE-2016-9559 Affected Products: openSUSE 13.2 ______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for GraphicsMagick fixes the following security issues:
- CVE-2016-9556: Maliciously crafted image headers could cause denial of service in image format detection routines (boo#1011130) - CVE-2016-9559: Maliciously crafted image headers could cause denial of service in image format detection routines for TIFF (boo#1011136)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2016-1413=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
ImageMagick-6.8.9.8-42.1 ImageMagick-debuginfo-6.8.9.8-42.1 ImageMagick-debugsource-6.8.9.8-42.1 ImageMagick-devel-6.8.9.8-42.1 ImageMagick-extra-6.8.9.8-42.1 ImageMagick-extra-debuginfo-6.8.9.8-42.1 libMagick++-6_Q16-5-6.8.9.8-42.1 libMagick++-6_Q16-5-debuginfo-6.8.9.8-42.1 libMagick++-devel-6.8.9.8-42.1 libMagickCore-6_Q16-2-6.8.9.8-42.1 libMagickCore-6_Q16-2-debuginfo-6.8.9.8-42.1 libMagickWand-6_Q16-2-6.8.9.8-42.1 libMagickWand-6_Q16-2-debuginfo-6.8.9.8-42.1 perl-PerlMagick-6.8.9.8-42.1 perl-PerlMagick-debuginfo-6.8.9.8-42.1
- openSUSE 13.2 (x86_64):
ImageMagick-devel-32bit-6.8.9.8-42.1 libMagick++-6_Q16-5-32bit-6.8.9.8-42.1 libMagick++-6_Q16-5-debuginfo-32bit-6.8.9.8-42.1 libMagick++-devel-32bit-6.8.9.8-42.1 libMagickCore-6_Q16-2-32bit-6.8.9.8-42.1 libMagickCore-6_Q16-2-debuginfo-32bit-6.8.9.8-42.1 libMagickWand-6_Q16-2-32bit-6.8.9.8-42.1 libMagickWand-6_Q16-2-debuginfo-32bit-6.8.9.8-42.1
- openSUSE 13.2 (noarch):
ImageMagick-doc-6.8.9.8-42.1
References:
https://www.suse.com/security/cve/CVE-2016-9556.html https://www.suse.com/security/cve/CVE-2016-9559.html https://bugzilla.suse.com/1011130 https://bugzilla.suse.com/1011136