Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ImageMagick
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ImageMagick
ID: SUSE-SU-2019:1712-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Desktop 12-SP3, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Workstation Extension 12-SP3, SUSE Linux Enterprise Software Development Kit 12-SP3, SUSE Linux Enterprise Desktop 12-SP4, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Workstation Extension 12-SP4
Datum: Di, 25. Juni 2019, 23:15
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
Applikationen: ImageMagick

Originalnachricht


SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID: SUSE-SU-2019:1712-1
Rating: moderate
References: #1133204 #1133205 #1133498 #1133501 #1134075
#1135232 #1135236 #1136183 #1136732 #1138425
#1138464
Cross-References: CVE-2017-12805 CVE-2017-12806 CVE-2019-10131
CVE-2019-11470 CVE-2019-11472 CVE-2019-11505
CVE-2019-11506 CVE-2019-11597 CVE-2019-11598

Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP4
SUSE Linux Enterprise Workstation Extension 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP4
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP4
SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________

An update that solves 9 vulnerabilities and has two fixes
is now available.

Description:

This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-11597: Fixed a heap-based buffer over-read in the
WriteTIFFImage() (bsc#1138464).
- Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).-
CVE-2019-11472: Fixed a denial of service in ReadXWDImage()
(bsc#1133204).
- CVE-2019-11470: Fixed a denial of service in ReadCINImage()
(bsc#1133205).
- CVE-2019-11506: Fixed a heap-based buffer overflow in the
WriteMATLABImage() (bsc#1133498).
- CVE-2019-11505: Fixed a heap-based buffer overflow in the
WritePDBImage() (bsc#1133501).
- CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function
in coders/meta.c (bsc#1134075).
- CVE-2017-12806: Fixed a denial of service through memory exhaustion in
format8BIM() (bsc#1135232).
- CVE-2017-12805: Fixed a denial of service through memory exhaustion in
ReadTIFFImage() (bsc#1135236).
- CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage()
(bsc#1136732)

We also now disable PCL in the -SUSE configuration, as it also uses
ghostscript for decoding (bsc#1136183)


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Workstation Extension 12-SP4:

zypper in -t patch SUSE-SLE-WE-12-SP4-2019-1712=1

- SUSE Linux Enterprise Workstation Extension 12-SP3:

zypper in -t patch SUSE-SLE-WE-12-SP3-2019-1712=1

- SUSE Linux Enterprise Software Development Kit 12-SP4:

zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-1712=1

- SUSE Linux Enterprise Software Development Kit 12-SP3:

zypper in -t patch SUSE-SLE-SDK-12-SP3-2019-1712=1

- SUSE Linux Enterprise Server 12-SP4:

zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1712=1

- SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-1712=1

- SUSE Linux Enterprise Desktop 12-SP4:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1712=1

- SUSE Linux Enterprise Desktop 12-SP3:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2019-1712=1



Package List:

- SUSE Linux Enterprise Workstation Extension 12-SP4 (x86_64):

ImageMagick-6.8.8.1-71.123.2
ImageMagick-config-6-SUSE-6.8.8.1-71.123.2
ImageMagick-config-6-upstream-6.8.8.1-71.123.2
ImageMagick-debuginfo-6.8.8.1-71.123.2
ImageMagick-debugsource-6.8.8.1-71.123.2
libMagick++-6_Q16-3-6.8.8.1-71.123.2
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.123.2

- SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64):

ImageMagick-6.8.8.1-71.123.2
ImageMagick-config-6-SUSE-6.8.8.1-71.123.2
ImageMagick-config-6-upstream-6.8.8.1-71.123.2
ImageMagick-debuginfo-6.8.8.1-71.123.2
ImageMagick-debugsource-6.8.8.1-71.123.2
libMagick++-6_Q16-3-6.8.8.1-71.123.2
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.123.2

- SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le
s390x x86_64):

ImageMagick-6.8.8.1-71.123.2
ImageMagick-debuginfo-6.8.8.1-71.123.2
ImageMagick-debugsource-6.8.8.1-71.123.2
ImageMagick-devel-6.8.8.1-71.123.2
libMagick++-6_Q16-3-6.8.8.1-71.123.2
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.123.2
libMagick++-devel-6.8.8.1-71.123.2
perl-PerlMagick-6.8.8.1-71.123.2
perl-PerlMagick-debuginfo-6.8.8.1-71.123.2

- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le
s390x x86_64):

ImageMagick-6.8.8.1-71.123.2
ImageMagick-debuginfo-6.8.8.1-71.123.2
ImageMagick-debugsource-6.8.8.1-71.123.2
ImageMagick-devel-6.8.8.1-71.123.2
libMagick++-6_Q16-3-6.8.8.1-71.123.2
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.123.2
libMagick++-devel-6.8.8.1-71.123.2
perl-PerlMagick-6.8.8.1-71.123.2
perl-PerlMagick-debuginfo-6.8.8.1-71.123.2

- SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.123.2
ImageMagick-config-6-upstream-6.8.8.1-71.123.2
ImageMagick-debuginfo-6.8.8.1-71.123.2
ImageMagick-debugsource-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.123.2
libMagickWand-6_Q16-1-6.8.8.1-71.123.2
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.123.2

- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.123.2
ImageMagick-config-6-upstream-6.8.8.1-71.123.2
ImageMagick-debuginfo-6.8.8.1-71.123.2
ImageMagick-debugsource-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.123.2
libMagickWand-6_Q16-1-6.8.8.1-71.123.2
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.123.2

- SUSE Linux Enterprise Desktop 12-SP4 (x86_64):

ImageMagick-6.8.8.1-71.123.2
ImageMagick-config-6-SUSE-6.8.8.1-71.123.2
ImageMagick-config-6-upstream-6.8.8.1-71.123.2
ImageMagick-debuginfo-6.8.8.1-71.123.2
ImageMagick-debugsource-6.8.8.1-71.123.2
libMagick++-6_Q16-3-6.8.8.1-71.123.2
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.123.2
libMagickWand-6_Q16-1-6.8.8.1-71.123.2
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.123.2

- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

ImageMagick-6.8.8.1-71.123.2
ImageMagick-config-6-SUSE-6.8.8.1-71.123.2
ImageMagick-config-6-upstream-6.8.8.1-71.123.2
ImageMagick-debuginfo-6.8.8.1-71.123.2
ImageMagick-debugsource-6.8.8.1-71.123.2
libMagick++-6_Q16-3-6.8.8.1-71.123.2
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.123.2
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.123.2
libMagickWand-6_Q16-1-6.8.8.1-71.123.2
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.123.2


References:

https://www.suse.com/security/cve/CVE-2017-12805.html
https://www.suse.com/security/cve/CVE-2017-12806.html
https://www.suse.com/security/cve/CVE-2019-10131.html
https://www.suse.com/security/cve/CVE-2019-11470.html
https://www.suse.com/security/cve/CVE-2019-11472.html
https://www.suse.com/security/cve/CVE-2019-11505.html
https://www.suse.com/security/cve/CVE-2019-11506.html
https://www.suse.com/security/cve/CVE-2019-11597.html
https://www.suse.com/security/cve/CVE-2019-11598.html
https://bugzilla.suse.com/1133204
https://bugzilla.suse.com/1133205
https://bugzilla.suse.com/1133498
https://bugzilla.suse.com/1133501
https://bugzilla.suse.com/1134075
https://bugzilla.suse.com/1135232
https://bugzilla.suse.com/1135236
https://bugzilla.suse.com/1136183
https://bugzilla.suse.com/1136732
https://bugzilla.suse.com/1138425
https://bugzilla.suse.com/1138464

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung