openSUSE-SU-2019:1683-1: moderate: Security update for ImageMagick
openSUSE Security Update: Security update for ImageMagick ______________________________________________________________________________ Announcement ID: openSUSE-SU-2019:1683-1 Rating: moderate References: #1133204 #1133205 #1133498 #1133501 #1134075 #1135232 #1135236 #1136183 #1136732 #1138425 #1138464 Cross-References: CVE-2017-12805 CVE-2017-12806 CVE-2019-10131 CVE-2019-11470 CVE-2019-11472 CVE-2019-11505 CVE-2019-11506 CVE-2019-11597 CVE-2019-11598 Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________ An update that solves 9 vulnerabilities and has two fixes is now available. Description: This update for ImageMagick fixes the following issues: Security issues fixed: - CVE-2019-11597: Fixed a heap-based buffer over-read in the WriteTIFFImage() (bsc#1138464). - Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).- CVE-2019-11472: Fixed a denial of service in ReadXWDImage() (bsc#1133204). - CVE-2019-11470: Fixed a denial of service in ReadCINImage() (bsc#1133205). - CVE-2019-11506: Fixed a heap-based buffer overflow in the WriteMATLABImage() (bsc#1133498). - CVE-2019-11505: Fixed a heap-based buffer overflow in the WritePDBImage() (bsc#1133501). - CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function in coders/meta.c (bsc#1134075). - CVE-2017-12806: Fixed a denial of service through memory exhaustion in format8BIM() (bsc#1135232). - CVE-2017-12805: Fixed a denial of service through memory exhaustion in ReadTIFFImage() (bsc#1135236). - CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage() (bsc#1136732) We also now disable PCL in the -SUSE configuration, as it also uses ghostscript for decoding (bsc#1136183) This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2019-1683=1 Package List: - openSUSE Leap 42.3 (i586 x86_64): ImageMagick-6.8.8.1-85.1 ImageMagick-config-6-SUSE-6.8.8.1-85.1 ImageMagick-config-6-upstream-6.8.8.1-85.1 ImageMagick-debuginfo-6.8.8.1-85.1 ImageMagick-debugsource-6.8.8.1-85.1 ImageMagick-devel-6.8.8.1-85.1 ImageMagick-extra-6.8.8.1-85.1 ImageMagick-extra-debuginfo-6.8.8.1-85.1 libMagick++-6_Q16-3-6.8.8.1-85.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-85.1 libMagick++-devel-6.8.8.1-85.1 libMagickCore-6_Q16-1-6.8.8.1-85.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-85.1 libMagickWand-6_Q16-1-6.8.8.1-85.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-85.1 perl-PerlMagick-6.8.8.1-85.1 perl-PerlMagick-debuginfo-6.8.8.1-85.1 - openSUSE Leap 42.3 (noarch): ImageMagick-doc-6.8.8.1-85.1 - openSUSE Leap 42.3 (x86_64): ImageMagick-devel-32bit-6.8.8.1-85.1 libMagick++-6_Q16-3-32bit-6.8.8.1-85.1 libMagick++-6_Q16-3-debuginfo-32bit-6.8.8.1-85.1 libMagick++-devel-32bit-6.8.8.1-85.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-85.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-85.1 libMagickWand-6_Q16-1-32bit-6.8.8.1-85.1 libMagickWand-6_Q16-1-debuginfo-32bit-6.8.8.1-85.1 References: https://www.suse.com/security/cve/CVE-2017-12805.html https://www.suse.com/security/cve/CVE-2017-12806.html https://www.suse.com/security/cve/CVE-2019-10131.html https://www.suse.com/security/cve/CVE-2019-11470.html https://www.suse.com/security/cve/CVE-2019-11472.html https://www.suse.com/security/cve/CVE-2019-11505.html https://www.suse.com/security/cve/CVE-2019-11506.html https://www.suse.com/security/cve/CVE-2019-11597.html https://www.suse.com/security/cve/CVE-2019-11598.html https://bugzilla.suse.com/1133204 https://bugzilla.suse.com/1133205 https://bugzilla.suse.com/1133498 https://bugzilla.suse.com/1133501 https://bugzilla.suse.com/1134075 https://bugzilla.suse.com/1135232 https://bugzilla.suse.com/1135236 https://bugzilla.suse.com/1136183 https://bugzilla.suse.com/1136732 https://bugzilla.suse.com/1138425 https://bugzilla.suse.com/1138464
participants (1)
-
opensuse-security@opensuse.org