Mailinglist Archive: opensuse-updates (118 mails)

< Previous Next >
openSUSE-SU-2016:2671-1: moderate: Security update for ImageMagick
openSUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:2671-1
Rating: moderate
References: #1000394 #1000399 #1000434 #1000436 #1000686
#1000688 #1000689 #1000690 #1000691 #1000692
#1000693 #1000694 #1000695 #1000696 #1000697
#1000698 #1000699 #1000700 #1000701 #1000703
#1000704 #1000706 #1000707 #1000708 #1000709
#1000710 #1000711 #1000712 #1000713 #1000714
#1000715 #1001066 #1001221 #1002206 #1002209
#1002421 #1002422 #1003629 #1005123 #1005125
#1005127 #1005328
Cross-References: CVE-2014-9907 CVE-2015-8957 CVE-2015-8958
CVE-2015-8959 CVE-2016-6823 CVE-2016-7101
CVE-2016-7513 CVE-2016-7514 CVE-2016-7515
CVE-2016-7516 CVE-2016-7517 CVE-2016-7518
CVE-2016-7519 CVE-2016-7520 CVE-2016-7521
CVE-2016-7522 CVE-2016-7523 CVE-2016-7524
CVE-2016-7525 CVE-2016-7527 CVE-2016-7528
CVE-2016-7529 CVE-2016-7530 CVE-2016-7531
CVE-2016-7532 CVE-2016-7533 CVE-2016-7534
CVE-2016-7535 CVE-2016-7536 CVE-2016-7537
CVE-2016-7538 CVE-2016-7539 CVE-2016-7540
CVE-2016-7799 CVE-2016-7800 CVE-2016-7996
CVE-2016-7997 CVE-2016-8677 CVE-2016-8682
CVE-2016-8683 CVE-2016-8684
Affected Products:
openSUSE 13.2
______________________________________________________________________________

An update that solves 41 vulnerabilities and has one errata
is now available.

Description:


This update for ImageMagick fixes the following issues:

- CVE-2016-8684: Mismatch between real filesize and header values
(bsc#1005123)
- CVE-2016-8683: Check that filesize is reasonable compared to the header
value (bsc#1005127)
- CVE-2016-8682: Stack-buffer read overflow while reading SCT header
(bsc#1005125)
- CVE-2016-8677: Memory allocation failure in AcquireQuantumPixels
(bsc#1005328)
- CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629)
- CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow
(bsc#1002422)
- CVE-2016-7799: Mogrify global buffer overflow (bsc#1002421)
- CVE-2016-7540: Writing to RGF format aborts (bsc#1000394)
- CVE-2016-7539: Potential DOS by not releasing memory (bsc#1000715)
- CVE-2016-7538: SIGABRT for corrupted pdb file (bsc#1000712)
- CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711)
- CVE-2016-7536: SEGV reported in corrupted profile handling (bsc#1000710)
- CVE-2016-7535: Out of bound access for corrupted psd file (bsc#1000709)
- CVE-2016-7534: Out of bound access in generic decoder (bsc#1000708)
- CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707)
- CVE-2016-7532: Fix handling of corrupted psd file (bsc#1000706)
- CVE-2016-7531: Pbd file out of bound access (bsc#1000704)
- CVE-2016-7530: Out of bound in quantum handling (bsc#1000703)
- CVE-2016-7529: Out of bound in quantum handling (bsc#1000399)
- CVE-2016-7528: Out of bound access in xcf file coder (bsc#1000434)
- CVE-2016-7527: Out of bound access in wpg file coder: (bsc#1000436)
- CVE-2016-7525: Heap buffer overflow in psd file coder (bsc#1000701)
- CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in
meta.c:465 (bsc#1000700)
- CVE-2016-7523: AddressSanitizer:heap-buffer-overflow READ of size 1
meta.c:496 (bsc#1000699)
- CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698)
- CVE-2016-7521: Heap buffer overflow in psd file handling (bsc#1000697)
- CVE-2016-7520: Heap overflow in hdr file handling (bsc#1000696)
- CVE-2016-7519: Out-of-bounds read in coders/rle.c (bsc#1000695)
- CVE-2016-7518: Out-of-bounds read in coders/sun.c (bsc#1000694)
- CVE-2016-7517: Out-of-bounds read in coders/pict.c (bsc#1000693)
- CVE-2016-7516: Out of bounds problem in rle, pict, viff and sun files
(bsc#1000692)
- CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689)
- CVE-2016-7514: Out-of-bounds read in coders/psd.c (bsc#1000688)
- CVE-2016-7513: Off-by-one error leading to segfault (bsc#1000686)
- CVE-2016-7101: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221)
- CVE-2016-6823: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066)
- CVE-2015-8959: DOS due to corrupted DDS files (bsc#1000713)
- CVE-2015-8958: Potential DOS in sun file handling due to malformed files
(bsc#1000691)
- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)
- CVE-2014-9907: DOS due to corrupted DDS files (bsc#1000714)
- Divide by zero in WriteTIFFImage (bsc#1002206)
- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209)


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2016-1242=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.2 (i586 x86_64):

ImageMagick-6.8.9.8-34.1
ImageMagick-debuginfo-6.8.9.8-34.1
ImageMagick-debugsource-6.8.9.8-34.1
ImageMagick-devel-6.8.9.8-34.1
ImageMagick-extra-6.8.9.8-34.1
ImageMagick-extra-debuginfo-6.8.9.8-34.1
libMagick++-6_Q16-5-6.8.9.8-34.1
libMagick++-6_Q16-5-debuginfo-6.8.9.8-34.1
libMagick++-devel-6.8.9.8-34.1
libMagickCore-6_Q16-2-6.8.9.8-34.1
libMagickCore-6_Q16-2-debuginfo-6.8.9.8-34.1
libMagickWand-6_Q16-2-6.8.9.8-34.1
libMagickWand-6_Q16-2-debuginfo-6.8.9.8-34.1
perl-PerlMagick-6.8.9.8-34.1
perl-PerlMagick-debuginfo-6.8.9.8-34.1

- openSUSE 13.2 (x86_64):

ImageMagick-devel-32bit-6.8.9.8-34.1
libMagick++-6_Q16-5-32bit-6.8.9.8-34.1
libMagick++-6_Q16-5-debuginfo-32bit-6.8.9.8-34.1
libMagick++-devel-32bit-6.8.9.8-34.1
libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1
libMagickCore-6_Q16-2-debuginfo-32bit-6.8.9.8-34.1
libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1
libMagickWand-6_Q16-2-debuginfo-32bit-6.8.9.8-34.1

- openSUSE 13.2 (noarch):

ImageMagick-doc-6.8.9.8-34.1


References:

https://www.suse.com/security/cve/CVE-2014-9907.html
https://www.suse.com/security/cve/CVE-2015-8957.html
https://www.suse.com/security/cve/CVE-2015-8958.html
https://www.suse.com/security/cve/CVE-2015-8959.html
https://www.suse.com/security/cve/CVE-2016-6823.html
https://www.suse.com/security/cve/CVE-2016-7101.html
https://www.suse.com/security/cve/CVE-2016-7513.html
https://www.suse.com/security/cve/CVE-2016-7514.html
https://www.suse.com/security/cve/CVE-2016-7515.html
https://www.suse.com/security/cve/CVE-2016-7516.html
https://www.suse.com/security/cve/CVE-2016-7517.html
https://www.suse.com/security/cve/CVE-2016-7518.html
https://www.suse.com/security/cve/CVE-2016-7519.html
https://www.suse.com/security/cve/CVE-2016-7520.html
https://www.suse.com/security/cve/CVE-2016-7521.html
https://www.suse.com/security/cve/CVE-2016-7522.html
https://www.suse.com/security/cve/CVE-2016-7523.html
https://www.suse.com/security/cve/CVE-2016-7524.html
https://www.suse.com/security/cve/CVE-2016-7525.html
https://www.suse.com/security/cve/CVE-2016-7527.html
https://www.suse.com/security/cve/CVE-2016-7528.html
https://www.suse.com/security/cve/CVE-2016-7529.html
https://www.suse.com/security/cve/CVE-2016-7530.html
https://www.suse.com/security/cve/CVE-2016-7531.html
https://www.suse.com/security/cve/CVE-2016-7532.html
https://www.suse.com/security/cve/CVE-2016-7533.html
https://www.suse.com/security/cve/CVE-2016-7534.html
https://www.suse.com/security/cve/CVE-2016-7535.html
https://www.suse.com/security/cve/CVE-2016-7536.html
https://www.suse.com/security/cve/CVE-2016-7537.html
https://www.suse.com/security/cve/CVE-2016-7538.html
https://www.suse.com/security/cve/CVE-2016-7539.html
https://www.suse.com/security/cve/CVE-2016-7540.html
https://www.suse.com/security/cve/CVE-2016-7799.html
https://www.suse.com/security/cve/CVE-2016-7800.html
https://www.suse.com/security/cve/CVE-2016-7996.html
https://www.suse.com/security/cve/CVE-2016-7997.html
https://www.suse.com/security/cve/CVE-2016-8677.html
https://www.suse.com/security/cve/CVE-2016-8682.html
https://www.suse.com/security/cve/CVE-2016-8683.html
https://www.suse.com/security/cve/CVE-2016-8684.html
https://bugzilla.suse.com/1000394
https://bugzilla.suse.com/1000399
https://bugzilla.suse.com/1000434
https://bugzilla.suse.com/1000436
https://bugzilla.suse.com/1000686
https://bugzilla.suse.com/1000688
https://bugzilla.suse.com/1000689
https://bugzilla.suse.com/1000690
https://bugzilla.suse.com/1000691
https://bugzilla.suse.com/1000692
https://bugzilla.suse.com/1000693
https://bugzilla.suse.com/1000694
https://bugzilla.suse.com/1000695
https://bugzilla.suse.com/1000696
https://bugzilla.suse.com/1000697
https://bugzilla.suse.com/1000698
https://bugzilla.suse.com/1000699
https://bugzilla.suse.com/1000700
https://bugzilla.suse.com/1000701
https://bugzilla.suse.com/1000703
https://bugzilla.suse.com/1000704
https://bugzilla.suse.com/1000706
https://bugzilla.suse.com/1000707
https://bugzilla.suse.com/1000708
https://bugzilla.suse.com/1000709
https://bugzilla.suse.com/1000710
https://bugzilla.suse.com/1000711
https://bugzilla.suse.com/1000712
https://bugzilla.suse.com/1000713
https://bugzilla.suse.com/1000714
https://bugzilla.suse.com/1000715
https://bugzilla.suse.com/1001066
https://bugzilla.suse.com/1001221
https://bugzilla.suse.com/1002206
https://bugzilla.suse.com/1002209
https://bugzilla.suse.com/1002421
https://bugzilla.suse.com/1002422
https://bugzilla.suse.com/1003629
https://bugzilla.suse.com/1005123
https://bugzilla.suse.com/1005125
https://bugzilla.suse.com/1005127
https://bugzilla.suse.com/1005328


< Previous Next >
This Thread
  • No further messages