SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:3378-1
Rating:             important
References:         #1048457 #1049796 #1050116 #1050139 #1050632 
                    #1051441 #1051847 #1052450 #1052553 #1052689 
                    #1052758 #1052764 #1054757 #1055214 #1056432 
                    #1057719 #1057729 #1057730 #1058485 #1058637 
                    #1059666 #1059778 #1060577 #1066003 #1067181 
                    #1067184 
Cross-References:   CVE-2017-11188 CVE-2017-11478 CVE-2017-11527
                    CVE-2017-11535 CVE-2017-11640 CVE-2017-11752
                    CVE-2017-12140 CVE-2017-12435 CVE-2017-12587
                    CVE-2017-12644 CVE-2017-12662 CVE-2017-12669
                    CVE-2017-12983 CVE-2017-13134 CVE-2017-13769
                    CVE-2017-14172 CVE-2017-14173 CVE-2017-14175
                    CVE-2017-14341 CVE-2017-14342 CVE-2017-14531
                    CVE-2017-14607 CVE-2017-14733 CVE-2017-15930
                    CVE-2017-16545 CVE-2017-16546
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that fixes 26 vulnerabilities is now available.

Description:

   This update for ImageMagick fixes the following issues:

     * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas
       could possibly disclose potentially sensitive memory [bsc#1059778]

     * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in
       coders/tiff.c [bsc#1050632]

     * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage in
       coders/wpg.c could lead to denial of service [bsc#1058485]

     * CVE-2017-14341: Infinite loop in the ReadWPGImage function
       [bsc#1058637]

     * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c
       could lead to denial of service [bsc#1067181]

     * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in
       validation problems could lead to denial of service [bsc#1067184]

     * CVE-2017-14175: Lack of End of File check could lead to denial of
       service [bsc#1057719]

     * CVE-2017-13769: denial of service issue in function
       WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]

     * CVE-2017-13134: a heap-based buffer over-read was found in thefunction
       SFWScan in coders/sfw.c, which allows attackers to cause adenial of
       service via a crafted file. [bsc#1055214]

     * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick
       allows remote attackers to cause a DoS [bsc#1049796]

     * CVE-2017-15930: Null Pointer dereference  while transfering JPEG
       scanlines could lead to denial of service [bsc#1066003]

     * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage
       function in coders/sfw.c allows remote attackers to cause a denial of
       service [bsc#1054757]

     * CVE-2017-14531: memory exhaustion issue in ReadSUNImage
       incoders/sun.c. [bsc#1059666]

     * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c,
       which allows attackers to cause denial of service [bsc#1052553]

     * CVE-2017-12587: User controlable large loop in the ReadPWPImage in
       coders\pwp.c could lead to denial of service [bsc#1052450]

     * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer
       overflow that could lead to denial of service [bsc#1057729]

     * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c
       in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause
       CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check.
       [bnc#1048457]

     * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows
       remote attackers to cause DoS [bnc#1050116]

     * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer
       over-read in WritePSImage() in coders/ps.c [bnc#1050139]

     * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows
       to cause DoS  [bnc#1051441]

     * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a
       ninteger signedness error leading to excessive memory consumption
       [bnc#1051847]

     * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in
       coders/cals.c [bnc#1052689]

     * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in
       WritePDFImage in coders/pdf.c [bnc#1052758]

     * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in
       codersdcm.c [bnc#1052764]

     * CVE-2017-14172: ImageMagick: Lack of end of file check in
       ReadPSImage() could lead to a denial of service [bnc#1057730]

     * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in
       coders/rle.c could lead to denial of service [bnc#1060577]


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-ImageMagick-13384=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-ImageMagick-13384=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-ImageMagick-13384=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      ImageMagick-6.4.3.6-7.78.14.1
      ImageMagick-devel-6.4.3.6-7.78.14.1
      libMagick++-devel-6.4.3.6-7.78.14.1
      libMagick++1-6.4.3.6-7.78.14.1
      libMagickWand1-6.4.3.6-7.78.14.1
      perl-PerlMagick-6.4.3.6-7.78.14.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):

      libMagickWand1-32bit-6.4.3.6-7.78.14.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libMagickCore1-6.4.3.6-7.78.14.1

   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

      libMagickCore1-32bit-6.4.3.6-7.78.14.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      ImageMagick-debuginfo-6.4.3.6-7.78.14.1
      ImageMagick-debugsource-6.4.3.6-7.78.14.1


References:

   https://www.suse.com/security/cve/CVE-2017-11188.html
   https://www.suse.com/security/cve/CVE-2017-11478.html
   https://www.suse.com/security/cve/CVE-2017-11527.html
   https://www.suse.com/security/cve/CVE-2017-11535.html
   https://www.suse.com/security/cve/CVE-2017-11640.html
   https://www.suse.com/security/cve/CVE-2017-11752.html
   https://www.suse.com/security/cve/CVE-2017-12140.html
   https://www.suse.com/security/cve/CVE-2017-12435.html
   https://www.suse.com/security/cve/CVE-2017-12587.html
   https://www.suse.com/security/cve/CVE-2017-12644.html
   https://www.suse.com/security/cve/CVE-2017-12662.html
   https://www.suse.com/security/cve/CVE-2017-12669.html
   https://www.suse.com/security/cve/CVE-2017-12983.html
   https://www.suse.com/security/cve/CVE-2017-13134.html
   https://www.suse.com/security/cve/CVE-2017-13769.html
   https://www.suse.com/security/cve/CVE-2017-14172.html
   https://www.suse.com/security/cve/CVE-2017-14173.html
   https://www.suse.com/security/cve/CVE-2017-14175.html
   https://www.suse.com/security/cve/CVE-2017-14341.html
   https://www.suse.com/security/cve/CVE-2017-14342.html
   https://www.suse.com/security/cve/CVE-2017-14531.html
   https://www.suse.com/security/cve/CVE-2017-14607.html
   https://www.suse.com/security/cve/CVE-2017-14733.html
   https://www.suse.com/security/cve/CVE-2017-15930.html
   https://www.suse.com/security/cve/CVE-2017-16545.html
   https://www.suse.com/security/cve/CVE-2017-16546.html
   https://bugzilla.suse.com/1048457
   https://bugzilla.suse.com/1049796
   https://bugzilla.suse.com/1050116
   https://bugzilla.suse.com/1050139
   https://bugzilla.suse.com/1050632
   https://bugzilla.suse.com/1051441
   https://bugzilla.suse.com/1051847
   https://bugzilla.suse.com/1052450
   https://bugzilla.suse.com/1052553
   https://bugzilla.suse.com/1052689
   https://bugzilla.suse.com/1052758
   https://bugzilla.suse.com/1052764
   https://bugzilla.suse.com/1054757
   https://bugzilla.suse.com/1055214
   https://bugzilla.suse.com/1056432
   https://bugzilla.suse.com/1057719
   https://bugzilla.suse.com/1057729
   https://bugzilla.suse.com/1057730
   https://bugzilla.suse.com/1058485
   https://bugzilla.suse.com/1058637
   https://bugzilla.suse.com/1059666
   https://bugzilla.suse.com/1059778
   https://bugzilla.suse.com/1060577
   https://bugzilla.suse.com/1066003
   https://bugzilla.suse.com/1067181
   https://bugzilla.suse.com/1067184

SuSE: 2017:3378-1: important: ImageMagick

December 20, 2017
An update that fixes 26 vulnerabilities is now available

Summary

This update for ImageMagick fixes the following issues: * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas could possibly disclose potentially sensitive memory [bsc#1059778] * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632] * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1058485] * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637] * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1067181] * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in validation problems could lead to denial of service [bsc#1067184] * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719] * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432] * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214] * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796] * CVE-2017-15930: Null Pointer dereference while transfering JPEG scanlines could lead to denial of service [bsc#1066003] * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c allows remote attackers to cause a denial of service [bsc#1054757] * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666] * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, which allows attackers to cause denial of service [bsc#1052553] * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450] * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729] * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457] * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139] * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS [bnc#1051441] * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689] * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758] * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764] * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730] * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577] Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-ImageMagick-13384=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-ImageMagick-13384=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-ImageMagick-13384=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): ImageMagick-6.4.3.6-7.78.14.1 ImageMagick-devel-6.4.3.6-7.78.14.1 libMagick++-devel-6.4.3.6-7.78.14.1 libMagick++1-6.4.3.6-7.78.14.1 libMagickWand1-6.4.3.6-7.78.14.1 perl-PerlMagick-6.4.3.6-7.78.14.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64): libMagickWand1-32bit-6.4.3.6-7.78.14.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libMagickCore1-6.4.3.6-7.78.14.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): libMagickCore1-32bit-6.4.3.6-7.78.14.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): ImageMagick-debuginfo-6.4.3.6-7.78.14.1 ImageMagick-debugsource-6.4.3.6-7.78.14.1

References

#1048457 #1049796 #1050116 #1050139 #1050632

#1051441 #1051847 #1052450 #1052553 #1052689

#1052758 #1052764 #1054757 #1055214 #1056432

#1057719 #1057729 #1057730 #1058485 #1058637

#1059666 #1059778 #1060577 #1066003 #1067181

#1067184

Cross- CVE-2017-11188 CVE-2017-11478 CVE-2017-11527

CVE-2017-11535 CVE-2017-11640 CVE-2017-11752

CVE-2017-12140 CVE-2017-12435 CVE-2017-12587

CVE-2017-12644 CVE-2017-12662 CVE-2017-12669

CVE-2017-12983 CVE-2017-13134 CVE-2017-13769

CVE-2017-14172 CVE-2017-14173 CVE-2017-14175

CVE-2017-14341 CVE-2017-14342 CVE-2017-14531

CVE-2017-14607 CVE-2017-14733 CVE-2017-15930

CVE-2017-16545 CVE-2017-16546

Affected Products:

SUSE Linux Enterprise Software Development Kit 11-SP4

SUSE Linux Enterprise Server 11-SP4

SUSE Linux Enterprise Debuginfo 11-SP4

https://www.suse.com/security/cve/CVE-2017-11188.html

https://www.suse.com/security/cve/CVE-2017-11478.html

https://www.suse.com/security/cve/CVE-2017-11527.html

https://www.suse.com/security/cve/CVE-2017-11535.html

https://www.suse.com/security/cve/CVE-2017-11640.html

https://www.suse.com/security/cve/CVE-2017-11752.html

https://www.suse.com/security/cve/CVE-2017-12140.html

https://www.suse.com/security/cve/CVE-2017-12435.html

https://www.suse.com/security/cve/CVE-2017-12587.html

https://www.suse.com/security/cve/CVE-2017-12644.html

https://www.suse.com/security/cve/CVE-2017-12662.html

https://www.suse.com/security/cve/CVE-2017-12669.html

https://www.suse.com/security/cve/CVE-2017-12983.html

https://www.suse.com/security/cve/CVE-2017-13134.html

https://www.suse.com/security/cve/CVE-2017-13769.html

https://www.suse.com/security/cve/CVE-2017-14172.html

https://www.suse.com/security/cve/CVE-2017-14173.html

https://www.suse.com/security/cve/CVE-2017-14175.html

https://www.suse.com/security/cve/CVE-2017-14341.html

https://www.suse.com/security/cve/CVE-2017-14342.html

https://www.suse.com/security/cve/CVE-2017-14531.html

https://www.suse.com/security/cve/CVE-2017-14607.html

https://www.suse.com/security/cve/CVE-2017-14733.html

https://www.suse.com/security/cve/CVE-2017-15930.html

https://www.suse.com/security/cve/CVE-2017-16545.html

https://www.suse.com/security/cve/CVE-2017-16546.html

https://bugzilla.suse.com/1048457

https://bugzilla.suse.com/1049796

https://bugzilla.suse.com/1050116

https://bugzilla.suse.com/1050139

https://bugzilla.suse.com/1050632

https://bugzilla.suse.com/1051441

https://bugzilla.suse.com/1051847

https://bugzilla.suse.com/1052450

https://bugzilla.suse.com/1052553

https://bugzilla.suse.com/1052689

https://bugzilla.suse.com/1052758

https://bugzilla.suse.com/1052764

https://bugzilla.suse.com/1054757

https://bugzilla.suse.com/1055214

https://bugzilla.suse.com/1056432

https://bugzilla.suse.com/1057719

https://bugzilla.suse.com/1057729

https://bugzilla.suse.com/1057730

https://bugzilla.suse.com/1058485

https://bugzilla.suse.com/1058637

https://bugzilla.suse.com/1059666

https://bugzilla.suse.com/1059778

https://bugzilla.suse.com/1060577

https://bugzilla.suse.com/1066003

https://bugzilla.suse.com/1067181

https://bugzilla.suse.com/1067184

Severity
Announcement ID: SUSE-SU-2017:3378-1
Rating: important

Related News