Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ImageMagick
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ImageMagick
ID: openSUSE-SU-2019:1683-1
Distribution: SUSE
Plattformen: openSUSE Leap 42.3
Datum: Mo, 1. Juli 2019, 19:18
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10131
Applikationen: ImageMagick

Originalnachricht

   openSUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:1683-1
Rating: moderate
References: #1133204 #1133205 #1133498 #1133501 #1134075
#1135232 #1135236 #1136183 #1136732 #1138425
#1138464
Cross-References: CVE-2017-12805 CVE-2017-12806 CVE-2019-10131
CVE-2019-11470 CVE-2019-11472 CVE-2019-11505
CVE-2019-11506 CVE-2019-11597 CVE-2019-11598

Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves 9 vulnerabilities and has two fixes
is now available.

Description:

This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2019-11597: Fixed a heap-based buffer over-read in the
WriteTIFFImage() (bsc#1138464).
- Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).-
CVE-2019-11472: Fixed a denial of service in ReadXWDImage()
(bsc#1133204).
- CVE-2019-11470: Fixed a denial of service in ReadCINImage()
(bsc#1133205).
- CVE-2019-11506: Fixed a heap-based buffer overflow in the
WriteMATLABImage() (bsc#1133498).
- CVE-2019-11505: Fixed a heap-based buffer overflow in the
WritePDBImage() (bsc#1133501).
- CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function
in coders/meta.c (bsc#1134075).
- CVE-2017-12806: Fixed a denial of service through memory exhaustion in
format8BIM() (bsc#1135232).
- CVE-2017-12805: Fixed a denial of service through memory exhaustion in
ReadTIFFImage() (bsc#1135236).
- CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage()
(bsc#1136732)

We also now disable PCL in the -SUSE configuration, as it also uses
ghostscript for decoding (bsc#1136183)

This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2019-1683=1



Package List:

- openSUSE Leap 42.3 (i586 x86_64):

ImageMagick-6.8.8.1-85.1
ImageMagick-config-6-SUSE-6.8.8.1-85.1
ImageMagick-config-6-upstream-6.8.8.1-85.1
ImageMagick-debuginfo-6.8.8.1-85.1
ImageMagick-debugsource-6.8.8.1-85.1
ImageMagick-devel-6.8.8.1-85.1
ImageMagick-extra-6.8.8.1-85.1
ImageMagick-extra-debuginfo-6.8.8.1-85.1
libMagick++-6_Q16-3-6.8.8.1-85.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-85.1
libMagick++-devel-6.8.8.1-85.1
libMagickCore-6_Q16-1-6.8.8.1-85.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-85.1
libMagickWand-6_Q16-1-6.8.8.1-85.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-85.1
perl-PerlMagick-6.8.8.1-85.1
perl-PerlMagick-debuginfo-6.8.8.1-85.1

- openSUSE Leap 42.3 (noarch):

ImageMagick-doc-6.8.8.1-85.1

- openSUSE Leap 42.3 (x86_64):

ImageMagick-devel-32bit-6.8.8.1-85.1
libMagick++-6_Q16-3-32bit-6.8.8.1-85.1
libMagick++-6_Q16-3-debuginfo-32bit-6.8.8.1-85.1
libMagick++-devel-32bit-6.8.8.1-85.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-85.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-85.1
libMagickWand-6_Q16-1-32bit-6.8.8.1-85.1
libMagickWand-6_Q16-1-debuginfo-32bit-6.8.8.1-85.1


References:

https://www.suse.com/security/cve/CVE-2017-12805.html
https://www.suse.com/security/cve/CVE-2017-12806.html
https://www.suse.com/security/cve/CVE-2019-10131.html
https://www.suse.com/security/cve/CVE-2019-11470.html
https://www.suse.com/security/cve/CVE-2019-11472.html
https://www.suse.com/security/cve/CVE-2019-11505.html
https://www.suse.com/security/cve/CVE-2019-11506.html
https://www.suse.com/security/cve/CVE-2019-11597.html
https://www.suse.com/security/cve/CVE-2019-11598.html
https://bugzilla.suse.com/1133204
https://bugzilla.suse.com/1133205
https://bugzilla.suse.com/1133498
https://bugzilla.suse.com/1133501
https://bugzilla.suse.com/1134075
https://bugzilla.suse.com/1135232
https://bugzilla.suse.com/1135236
https://bugzilla.suse.com/1136183
https://bugzilla.suse.com/1136732
https://bugzilla.suse.com/1138425
https://bugzilla.suse.com/1138464

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung