openSUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2019:1683-1
Rating:             moderate
References:         #1133204 #1133205 #1133498 #1133501 #1134075 
                    #1135232 #1135236 #1136183 #1136732 #1138425 
                    #1138464 
Cross-References:   CVE-2017-12805 CVE-2017-12806 CVE-2019-10131
                    CVE-2019-11470 CVE-2019-11472 CVE-2019-11505
                    CVE-2019-11506 CVE-2019-11597 CVE-2019-11598
                   
Affected Products:
                    openSUSE Leap 42.3
______________________________________________________________________________

   An update that solves 9 vulnerabilities and has two fixes
   is now available.

Description:

   This update for ImageMagick fixes the following issues:

   Security issues fixed:

   - CVE-2019-11597: Fixed a heap-based buffer over-read in the
     WriteTIFFImage() (bsc#1138464).
   - Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).-
     CVE-2019-11472: Fixed a denial of service in ReadXWDImage()
     (bsc#1133204).
   - CVE-2019-11470: Fixed a denial of service in ReadCINImage()
     (bsc#1133205).
   - CVE-2019-11506: Fixed a heap-based buffer overflow in the
     WriteMATLABImage() (bsc#1133498).
   - CVE-2019-11505: Fixed a heap-based buffer overflow in the
     WritePDBImage() (bsc#1133501).
   - CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function
     in coders/meta.c (bsc#1134075).
   - CVE-2017-12806: Fixed a denial of service through memory exhaustion in
     format8BIM() (bsc#1135232).
   - CVE-2017-12805: Fixed a denial of service through memory exhaustion in
     ReadTIFFImage() (bsc#1135236).
   - CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage()
     (bsc#1136732)

   We also now disable PCL in the -SUSE configuration, as it also uses
   ghostscript for decoding (bsc#1136183)

   This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.3:

      zypper in -t patch openSUSE-2019-1683=1



Package List:

   - openSUSE Leap 42.3 (i586 x86_64):

      ImageMagick-6.8.8.1-85.1
      ImageMagick-config-6-SUSE-6.8.8.1-85.1
      ImageMagick-config-6-upstream-6.8.8.1-85.1
      ImageMagick-debuginfo-6.8.8.1-85.1
      ImageMagick-debugsource-6.8.8.1-85.1
      ImageMagick-devel-6.8.8.1-85.1
      ImageMagick-extra-6.8.8.1-85.1
      ImageMagick-extra-debuginfo-6.8.8.1-85.1
      libMagick++-6_Q16-3-6.8.8.1-85.1
      libMagick++-6_Q16-3-debuginfo-6.8.8.1-85.1
      libMagick++-devel-6.8.8.1-85.1
      libMagickCore-6_Q16-1-6.8.8.1-85.1
      libMagickCore-6_Q16-1-debuginfo-6.8.8.1-85.1
      libMagickWand-6_Q16-1-6.8.8.1-85.1
      libMagickWand-6_Q16-1-debuginfo-6.8.8.1-85.1
      perl-PerlMagick-6.8.8.1-85.1
      perl-PerlMagick-debuginfo-6.8.8.1-85.1

   - openSUSE Leap 42.3 (noarch):

      ImageMagick-doc-6.8.8.1-85.1

   - openSUSE Leap 42.3 (x86_64):

      ImageMagick-devel-32bit-6.8.8.1-85.1
      libMagick++-6_Q16-3-32bit-6.8.8.1-85.1
      libMagick++-6_Q16-3-debuginfo-32bit-6.8.8.1-85.1
      libMagick++-devel-32bit-6.8.8.1-85.1
      libMagickCore-6_Q16-1-32bit-6.8.8.1-85.1
      libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-85.1
      libMagickWand-6_Q16-1-32bit-6.8.8.1-85.1
      libMagickWand-6_Q16-1-debuginfo-32bit-6.8.8.1-85.1


References:

   https://www.suse.com/security/cve/CVE-2017-12805.html
   https://www.suse.com/security/cve/CVE-2017-12806.html
   https://www.suse.com/security/cve/CVE-2019-10131.html
   https://www.suse.com/security/cve/CVE-2019-11470.html
   https://www.suse.com/security/cve/CVE-2019-11472.html
   https://www.suse.com/security/cve/CVE-2019-11505.html
   https://www.suse.com/security/cve/CVE-2019-11506.html
   https://www.suse.com/security/cve/CVE-2019-11597.html
   https://www.suse.com/security/cve/CVE-2019-11598.html
   https://bugzilla.suse.com/1133204
   https://bugzilla.suse.com/1133205
   https://bugzilla.suse.com/1133498
   https://bugzilla.suse.com/1133501
   https://bugzilla.suse.com/1134075
   https://bugzilla.suse.com/1135232
   https://bugzilla.suse.com/1135236
   https://bugzilla.suse.com/1136183
   https://bugzilla.suse.com/1136732
   https://bugzilla.suse.com/1138425
   https://bugzilla.suse.com/1138464

-- 

openSUSE: 2019:1683-1: moderate: ImageMagick

July 1, 2019
An update that solves 9 vulnerabilities and has two fixes is now available.

Description

This update for ImageMagick fixes the following issues: Security issues fixed: - CVE-2019-11597: Fixed a heap-based buffer over-read in the WriteTIFFImage() (bsc#1138464). - Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).- CVE-2019-11472: Fixed a denial of service in ReadXWDImage() (bsc#1133204). - CVE-2019-11470: Fixed a denial of service in ReadCINImage() (bsc#1133205). - CVE-2019-11506: Fixed a heap-based buffer overflow in the WriteMATLABImage() (bsc#1133498). - CVE-2019-11505: Fixed a heap-based buffer overflow in the WritePDBImage() (bsc#1133501). - CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function in coders/meta.c (bsc#1134075). - CVE-2017-12806: Fixed a denial of service through memory exhaustion in format8BIM() (bsc#1135232). - CVE-2017-12805: Fixed a denial of service through memory exhaustion in ReadTIFFImage() (bsc#1135236). - CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage() (bsc#1136732) We also now disable PCL in the -SUSE configuration, as it also uses ghostscript for decoding (bsc#1136183) This update was imported from the SUSE:SLE-12:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2019-1683=1


Package List

- openSUSE Leap 42.3 (i586 x86_64): ImageMagick-6.8.8.1-85.1 ImageMagick-config-6-SUSE-6.8.8.1-85.1 ImageMagick-config-6-upstream-6.8.8.1-85.1 ImageMagick-debuginfo-6.8.8.1-85.1 ImageMagick-debugsource-6.8.8.1-85.1 ImageMagick-devel-6.8.8.1-85.1 ImageMagick-extra-6.8.8.1-85.1 ImageMagick-extra-debuginfo-6.8.8.1-85.1 libMagick++-6_Q16-3-6.8.8.1-85.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-85.1 libMagick++-devel-6.8.8.1-85.1 libMagickCore-6_Q16-1-6.8.8.1-85.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-85.1 libMagickWand-6_Q16-1-6.8.8.1-85.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-85.1 perl-PerlMagick-6.8.8.1-85.1 perl-PerlMagick-debuginfo-6.8.8.1-85.1 - openSUSE Leap 42.3 (noarch): ImageMagick-doc-6.8.8.1-85.1 - openSUSE Leap 42.3 (x86_64): ImageMagick-devel-32bit-6.8.8.1-85.1 libMagick++-6_Q16-3-32bit-6.8.8.1-85.1 libMagick++-6_Q16-3-debuginfo-32bit-6.8.8.1-85.1 libMagick++-devel-32bit-6.8.8.1-85.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-85.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-85.1 libMagickWand-6_Q16-1-32bit-6.8.8.1-85.1 libMagickWand-6_Q16-1-debuginfo-32bit-6.8.8.1-85.1


References

https://www.suse.com/security/cve/CVE-2017-12805.html https://www.suse.com/security/cve/CVE-2017-12806.html https://www.suse.com/security/cve/CVE-2019-10131.html https://www.suse.com/security/cve/CVE-2019-11470.html https://www.suse.com/security/cve/CVE-2019-11472.html https://www.suse.com/security/cve/CVE-2019-11505.html https://www.suse.com/security/cve/CVE-2019-11506.html https://www.suse.com/security/cve/CVE-2019-11597.html https://www.suse.com/security/cve/CVE-2019-11598.html https://bugzilla.suse.com/1133204 https://bugzilla.suse.com/1133205 https://bugzilla.suse.com/1133498 https://bugzilla.suse.com/1133501 https://bugzilla.suse.com/1134075 https://bugzilla.suse.com/1135232 https://bugzilla.suse.com/1135236 https://bugzilla.suse.com/1136183 https://bugzilla.suse.com/1136732 https://bugzilla.suse.com/1138425 https://bugzilla.suse.com/1138464--


Severity
Announcement ID: openSUSE-SU-2019:1683-1
Rating: moderate
Affected Products: openSUSE Leap 42.3 le.

Related News