SUSE: 2019:1019-1 moderate: ImageMagick

    Date24 Apr 2019
    CategorySuSE
    264
    Posted ByLinuxSecurity Advisories
    An update that solves four vulnerabilities and has one errata is now available.
    
       SUSE Security Update: Security update for ImageMagick
    ______________________________________________________________________________
    
    Announcement ID:    SUSE-SU-2019:1019-1
    Rating:             moderate
    References:         #1122033 #1130330 #1131317 #1132054 #1132060 
                        
    Cross-References:   CVE-2019-10650 CVE-2019-11007 CVE-2019-11008
                        CVE-2019-9956
    Affected Products:
                        SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
                        SUSE Linux Enterprise Module for Development Tools 15
                        SUSE Linux Enterprise Module for Desktop Applications 15
    ______________________________________________________________________________
    
       An update that solves four vulnerabilities and has one
       errata is now available.
    
    Description:
    
       This update for ImageMagick fixes the following issues:
    
       Security issues fixed:
    
       - CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel()
         (bsc#1130330).
       - CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage()
         (bsc#1131317).
       - CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage()
         (bsc#1132060).
       - CVE-2019-11008: Fixed a heap-based buffer overflow in WriteXWDImage()
         (bsc#1132054).
    
       - Added extra -config- packages with Postscript/EPS/PDF readers still
         enabled.
    
         Removing the PS decoders is used to harden ImageMagick against security
       issues within ghostscript. Enabling them might impact security.
       (bsc#1122033)
    
         These are two packages that can be selected:
    
         - ImageMagick-config-7-SUSE: This has the PS decoders disabled.
         - ImageMagick-config-7-upstream: This has the PS decoders enabled.
    
         Depending on your local needs install either one of them. The default is
       the -SUSE configuration.
    
    
    Patch Instructions:
    
       To install this SUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:
    
          zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-1019=1
    
       - SUSE Linux Enterprise Module for Development Tools 15:
    
          zypper in -t patch SUSE-SLE-Module-Development-Tools-15-2019-1019=1
    
       - SUSE Linux Enterprise Module for Desktop Applications 15:
    
          zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2019-1019=1
    
    
    
    Package List:
    
       - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (aarch64 ppc64le s390x x86_64):
    
          ImageMagick-debuginfo-7.0.7.34-3.54.3
          ImageMagick-debugsource-7.0.7.34-3.54.3
          ImageMagick-extra-7.0.7.34-3.54.3
          ImageMagick-extra-debuginfo-7.0.7.34-3.54.3
    
       - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (noarch):
    
          ImageMagick-doc-7.0.7.34-3.54.3
    
       - SUSE Linux Enterprise Module for Development Tools 15 (aarch64 ppc64le s390x x86_64):
    
          ImageMagick-debuginfo-7.0.7.34-3.54.3
          ImageMagick-debugsource-7.0.7.34-3.54.3
          perl-PerlMagick-7.0.7.34-3.54.3
          perl-PerlMagick-debuginfo-7.0.7.34-3.54.3
    
       - SUSE Linux Enterprise Module for Desktop Applications 15 (aarch64 ppc64le s390x x86_64):
    
          ImageMagick-7.0.7.34-3.54.3
          ImageMagick-config-7-SUSE-7.0.7.34-3.54.3
          ImageMagick-config-7-upstream-7.0.7.34-3.54.3
          ImageMagick-debuginfo-7.0.7.34-3.54.3
          ImageMagick-debugsource-7.0.7.34-3.54.3
          ImageMagick-devel-7.0.7.34-3.54.3
          libMagick++-7_Q16HDRI4-7.0.7.34-3.54.3
          libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.54.3
          libMagick++-devel-7.0.7.34-3.54.3
          libMagickCore-7_Q16HDRI6-7.0.7.34-3.54.3
          libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.54.3
          libMagickWand-7_Q16HDRI6-7.0.7.34-3.54.3
          libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.54.3
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2019-10650.html
       https://www.suse.com/security/cve/CVE-2019-11007.html
       https://www.suse.com/security/cve/CVE-2019-11008.html
       https://www.suse.com/security/cve/CVE-2019-9956.html
       https://bugzilla.suse.com/1122033
       https://bugzilla.suse.com/1130330
       https://bugzilla.suse.com/1131317
       https://bugzilla.suse.com/1132054
       https://bugzilla.suse.com/1132060
    
    _______________________________________________
    sle-security-updates mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://lists.suse.com/mailman/listinfo/sle-security-updates
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com feature?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    17
    radio
    [{"id":"65","title":"Feature articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"66","title":"News","votes":"1","type":"x","order":"2","pct":100,"resources":[]},{"id":"67","title":"HOWTOs","votes":"0","type":"x","order":"3","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.