openSUSE-SU-2018:0893-1: moderate: Security update for ImageMagick
openSUSE Security Update: Security update for ImageMagick ______________________________________________________________________________ Announcement ID: openSUSE-SU-2018:0893-1 Rating: moderate References: #1043290 #1050087 #1056434 #1058630 #1059735 #1060382 #1066168 #1066170 #1082283 #1082291 #1082348 #1082362 #1082792 #1082837 #1083628 #1083634 #1086011 Cross-References: CVE-2017-11524 CVE-2017-12692 CVE-2017-12693 CVE-2017-13768 CVE-2017-14314 CVE-2017-14505 CVE-2017-14739 CVE-2017-15016 CVE-2017-15017 CVE-2017-16352 CVE-2017-16353 CVE-2017-18209 CVE-2017-18211 CVE-2017-9500 CVE-2018-7443 CVE-2018-7470 CVE-2018-8804 Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________ An update that fixes 17 vulnerabilities is now available. Description: This update for ImageMagick fixes several issues. These security issues were fixed: - CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact via a crafted file (bsc#1086011). - CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted file (bsc#1050087). - CVE-2017-18209: Prevent NULL pointer dereference in the GetOpenCLCachedFilesDirectory function caused by a memory allocation result that was not checked, related to GetOpenCLCacheDirectory (bsc#1083628). - CVE-2017-18211: Prevent NULL pointer dereference in the function saveBinaryCLProgram caused by a program-lookup result not being checked, related to CacheOpenCLKernel (bsc#1083634). - CVE-2017-9500: Prevent assertion failure in the function ResetImageProfileIterator, which allowed attackers to cause a denial of service via a crafted file (bsc#1043290). - CVE-2017-14739: The AcquireResampleFilterThreadSet function mishandled failed memory allocation, which allowed remote attackers to cause a denial of service (NULL Pointer Dereference in DistortImage in MagickCore/distort.c, and application crash) via unspecified vectors (bsc#1060382). - CVE-2017-16353: Prevent memory information disclosure in the DescribeImage function caused by a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments were never checked (bsc#1066170). - CVE-2017-16352: Prevent a heap-based buffer overflow in the "Display visual image directory" feature of the DescribeImage() function. One possible way to trigger the vulnerability is to run the identify command on a specially crafted MIFF format file with the verbose flag (bsc#1066168). - CVE-2017-14314: Prevent off-by-one error in the DrawImage function that allowed remote attackers to cause a denial of service (DrawDashPolygon heap-based buffer over-read and application crash) via a crafted file (bsc#1058630). - CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage function that allowed an attacker to perform denial of service by sending a crafted image file (bsc#1056434). - CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to perform Denial of Service (NULL pointer dereference and application crash in AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image File as input (bsc#1059735). - CVE-2018-7470: The IsWEBPImageLossless function allowed attackers to cause a denial of service (segmentation violation) via a crafted file (bsc#1082837). - CVE-2018-7443: The ReadTIFFImage function did not properly validate the amount of image data in a file, which allowed remote attackers to cause a denial of service (memory allocation failure in the AcquireMagickMemory function in MagickCore/memory.c) (bsc#1082792). - CVE-2017-15016: Prevent NULL pointer dereference vulnerability in ReadEnhMetaFile allowing for denial of service (bsc#1082291). - CVE-2017-15017: Prevent NULL pointer dereference vulnerability in ReadOneMNGImage allowing for denial of service (bsc#1082283). - CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362). - CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a denial of service (memory consumption) via a crafted BMP file (bsc#1082348). This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-343=1 Package List: - openSUSE Leap 42.3 (i586 x86_64): ImageMagick-6.8.8.1-58.1 ImageMagick-debuginfo-6.8.8.1-58.1 ImageMagick-debugsource-6.8.8.1-58.1 ImageMagick-devel-6.8.8.1-58.1 ImageMagick-extra-6.8.8.1-58.1 ImageMagick-extra-debuginfo-6.8.8.1-58.1 libMagick++-6_Q16-3-6.8.8.1-58.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-58.1 libMagick++-devel-6.8.8.1-58.1 libMagickCore-6_Q16-1-6.8.8.1-58.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-58.1 libMagickWand-6_Q16-1-6.8.8.1-58.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-58.1 perl-PerlMagick-6.8.8.1-58.1 perl-PerlMagick-debuginfo-6.8.8.1-58.1 - openSUSE Leap 42.3 (noarch): ImageMagick-doc-6.8.8.1-58.1 - openSUSE Leap 42.3 (x86_64): ImageMagick-devel-32bit-6.8.8.1-58.1 libMagick++-6_Q16-3-32bit-6.8.8.1-58.1 libMagick++-6_Q16-3-debuginfo-32bit-6.8.8.1-58.1 libMagick++-devel-32bit-6.8.8.1-58.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-58.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-58.1 libMagickWand-6_Q16-1-32bit-6.8.8.1-58.1 libMagickWand-6_Q16-1-debuginfo-32bit-6.8.8.1-58.1 References: https://www.suse.com/security/cve/CVE-2017-11524.html https://www.suse.com/security/cve/CVE-2017-12692.html https://www.suse.com/security/cve/CVE-2017-12693.html https://www.suse.com/security/cve/CVE-2017-13768.html https://www.suse.com/security/cve/CVE-2017-14314.html https://www.suse.com/security/cve/CVE-2017-14505.html https://www.suse.com/security/cve/CVE-2017-14739.html https://www.suse.com/security/cve/CVE-2017-15016.html https://www.suse.com/security/cve/CVE-2017-15017.html https://www.suse.com/security/cve/CVE-2017-16352.html https://www.suse.com/security/cve/CVE-2017-16353.html https://www.suse.com/security/cve/CVE-2017-18209.html https://www.suse.com/security/cve/CVE-2017-18211.html https://www.suse.com/security/cve/CVE-2017-9500.html https://www.suse.com/security/cve/CVE-2018-7443.html https://www.suse.com/security/cve/CVE-2018-7470.html https://www.suse.com/security/cve/CVE-2018-8804.html https://bugzilla.suse.com/1043290 https://bugzilla.suse.com/1050087 https://bugzilla.suse.com/1056434 https://bugzilla.suse.com/1058630 https://bugzilla.suse.com/1059735 https://bugzilla.suse.com/1060382 https://bugzilla.suse.com/1066168 https://bugzilla.suse.com/1066170 https://bugzilla.suse.com/1082283 https://bugzilla.suse.com/1082291 https://bugzilla.suse.com/1082348 https://bugzilla.suse.com/1082362 https://bugzilla.suse.com/1082792 https://bugzilla.suse.com/1082837 https://bugzilla.suse.com/1083628 https://bugzilla.suse.com/1083634 https://bugzilla.suse.com/1086011
participants (1)
-
opensuse-security@opensuse.org