Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ImageMagick
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ImageMagick
ID: SUSE-SU-2021:0199-1
Distribution: SUSE
Plattformen: SUSE OpenStack Cloud 7, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE OpenStack Cloud Crowbar 8, SUSE HPE Helion Openstack 8, SUSE OpenStack Cloud 8, SUSE Enterprise Storage 5, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server for SAP 12-SP4, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 9, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Software Development Kit 12-SP5, SUSE Linux Enterprise Workstation Extension 12-SP5, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP4-LTSS
Datum: Sa, 23. Januar 2021, 09:02
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
Applikationen: ImageMagick

Originalnachricht


SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID: SUSE-SU-2021:0199-1
Rating: important
References: #1179103 #1179202 #1179208 #1179212 #1179223
#1179240 #1179244 #1179260 #1179268 #1179269
#1179278 #1179281 #1179285 #1179311 #1179312
#1179313 #1179315 #1179317 #1179321 #1179322
#1179327 #1179333 #1179336 #1179338 #1179339
#1179343 #1179345 #1179346 #1179347 #1179361
#1179362 #1179397
Cross-References: CVE-2020-19667 CVE-2020-25664 CVE-2020-25665
CVE-2020-25666 CVE-2020-25674 CVE-2020-25675
CVE-2020-25676 CVE-2020-27750 CVE-2020-27751
CVE-2020-27752 CVE-2020-27753 CVE-2020-27754
CVE-2020-27755 CVE-2020-27757 CVE-2020-27759
CVE-2020-27760 CVE-2020-27761 CVE-2020-27762
CVE-2020-27763 CVE-2020-27764 CVE-2020-27765
CVE-2020-27766 CVE-2020-27767 CVE-2020-27768
CVE-2020-27769 CVE-2020-27770 CVE-2020-27771
CVE-2020-27772 CVE-2020-27773 CVE-2020-27774
CVE-2020-27775 CVE-2020-27776
Affected Products:
SUSE OpenStack Cloud Crowbar 9
SUSE OpenStack Cloud Crowbar 8
SUSE OpenStack Cloud 9
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud 7
SUSE Linux Enterprise Workstation Extension 12-SP5
SUSE Linux Enterprise Software Development Kit 12-SP5
SUSE Linux Enterprise Server for SAP 12-SP4
SUSE Linux Enterprise Server for SAP 12-SP3
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server 12-SP4-LTSS
SUSE Linux Enterprise Server 12-SP3-LTSS
SUSE Linux Enterprise Server 12-SP3-BCL
SUSE Linux Enterprise Server 12-SP2-LTSS
SUSE Linux Enterprise Server 12-SP2-BCL
SUSE Enterprise Storage 5
HPE Helion Openstack 8
______________________________________________________________________________

An update that fixes 32 vulnerabilities is now available.

Description:

This update for ImageMagick fixes the following issues:

- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result
in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel
(bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage
(bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of
type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage
(bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of
type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of
type 'long' and integer overflow at MagickCore/pixel.c
(bsc#1179244).
- CVE-2020-27750: Fixed an division by zero in
MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c
(bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in
MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function
(bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of
type 'long' and signed integer overflow at MagickCore/quantize.c
(bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in
ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of
type 'unsigned long long' at MagickCore/quantum-private.h
(bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of
type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c
(bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of
type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of
type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c
(bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of
type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c
(bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of
type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of
type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of
type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of
type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27770: Fixed an unsigned offset overflowed at
MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of
type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of
type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h
(bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c
(bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of
type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of
type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE OpenStack Cloud Crowbar 9:

zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2021-199=1

- SUSE OpenStack Cloud Crowbar 8:

zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2021-199=1

- SUSE OpenStack Cloud 9:

zypper in -t patch SUSE-OpenStack-Cloud-9-2021-199=1

- SUSE OpenStack Cloud 8:

zypper in -t patch SUSE-OpenStack-Cloud-8-2021-199=1

- SUSE OpenStack Cloud 7:

zypper in -t patch SUSE-OpenStack-Cloud-7-2021-199=1

- SUSE Linux Enterprise Workstation Extension 12-SP5:

zypper in -t patch SUSE-SLE-WE-12-SP5-2021-199=1

- SUSE Linux Enterprise Software Development Kit 12-SP5:

zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-199=1

- SUSE Linux Enterprise Server for SAP 12-SP4:

zypper in -t patch SUSE-SLE-SAP-12-SP4-2021-199=1

- SUSE Linux Enterprise Server for SAP 12-SP3:

zypper in -t patch SUSE-SLE-SAP-12-SP3-2021-199=1

- SUSE Linux Enterprise Server for SAP 12-SP2:

zypper in -t patch SUSE-SLE-SAP-12-SP2-2021-199=1

- SUSE Linux Enterprise Server 12-SP5:

zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-199=1

- SUSE Linux Enterprise Server 12-SP4-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2021-199=1

- SUSE Linux Enterprise Server 12-SP3-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2021-199=1

- SUSE Linux Enterprise Server 12-SP3-BCL:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2021-199=1

- SUSE Linux Enterprise Server 12-SP2-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2021-199=1

- SUSE Linux Enterprise Server 12-SP2-BCL:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2021-199=1

- SUSE Enterprise Storage 5:

zypper in -t patch SUSE-Storage-5-2021-199=1

- HPE Helion Openstack 8:

zypper in -t patch HPE-Helion-OpenStack-8-2021-199=1



Package List:

- SUSE OpenStack Cloud Crowbar 9 (x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE OpenStack Cloud Crowbar 8 (x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE OpenStack Cloud 9 (x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE OpenStack Cloud 8 (x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE OpenStack Cloud 7 (s390x x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64):

ImageMagick-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagick++-6_Q16-3-6.8.8.1-71.154.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.154.1

- SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le
s390x x86_64):

ImageMagick-6.8.8.1-71.154.1
ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
ImageMagick-devel-6.8.8.1-71.154.1
libMagick++-6_Q16-3-6.8.8.1-71.154.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.154.1
libMagick++-devel-6.8.8.1-71.154.1
perl-PerlMagick-6.8.8.1-71.154.1
perl-PerlMagick-debuginfo-6.8.8.1-71.154.1

- SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- SUSE Enterprise Storage 5 (aarch64 x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1

- HPE Helion Openstack 8 (x86_64):

ImageMagick-config-6-SUSE-6.8.8.1-71.154.1
ImageMagick-config-6-upstream-6.8.8.1-71.154.1
ImageMagick-debuginfo-6.8.8.1-71.154.1
ImageMagick-debugsource-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-6.8.8.1-71.154.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-6.8.8.1-71.154.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.154.1


References:

https://www.suse.com/security/cve/CVE-2020-19667.html
https://www.suse.com/security/cve/CVE-2020-25664.html
https://www.suse.com/security/cve/CVE-2020-25665.html
https://www.suse.com/security/cve/CVE-2020-25666.html
https://www.suse.com/security/cve/CVE-2020-25674.html
https://www.suse.com/security/cve/CVE-2020-25675.html
https://www.suse.com/security/cve/CVE-2020-25676.html
https://www.suse.com/security/cve/CVE-2020-27750.html
https://www.suse.com/security/cve/CVE-2020-27751.html
https://www.suse.com/security/cve/CVE-2020-27752.html
https://www.suse.com/security/cve/CVE-2020-27753.html
https://www.suse.com/security/cve/CVE-2020-27754.html
https://www.suse.com/security/cve/CVE-2020-27755.html
https://www.suse.com/security/cve/CVE-2020-27757.html
https://www.suse.com/security/cve/CVE-2020-27759.html
https://www.suse.com/security/cve/CVE-2020-27760.html
https://www.suse.com/security/cve/CVE-2020-27761.html
https://www.suse.com/security/cve/CVE-2020-27762.html
https://www.suse.com/security/cve/CVE-2020-27763.html
https://www.suse.com/security/cve/CVE-2020-27764.html
https://www.suse.com/security/cve/CVE-2020-27765.html
https://www.suse.com/security/cve/CVE-2020-27766.html
https://www.suse.com/security/cve/CVE-2020-27767.html
https://www.suse.com/security/cve/CVE-2020-27768.html
https://www.suse.com/security/cve/CVE-2020-27769.html
https://www.suse.com/security/cve/CVE-2020-27770.html
https://www.suse.com/security/cve/CVE-2020-27771.html
https://www.suse.com/security/cve/CVE-2020-27772.html
https://www.suse.com/security/cve/CVE-2020-27773.html
https://www.suse.com/security/cve/CVE-2020-27774.html
https://www.suse.com/security/cve/CVE-2020-27775.html
https://www.suse.com/security/cve/CVE-2020-27776.html
https://bugzilla.suse.com/1179103
https://bugzilla.suse.com/1179202
https://bugzilla.suse.com/1179208
https://bugzilla.suse.com/1179212
https://bugzilla.suse.com/1179223
https://bugzilla.suse.com/1179240
https://bugzilla.suse.com/1179244
https://bugzilla.suse.com/1179260
https://bugzilla.suse.com/1179268
https://bugzilla.suse.com/1179269
https://bugzilla.suse.com/1179278
https://bugzilla.suse.com/1179281
https://bugzilla.suse.com/1179285
https://bugzilla.suse.com/1179311
https://bugzilla.suse.com/1179312
https://bugzilla.suse.com/1179313
https://bugzilla.suse.com/1179315
https://bugzilla.suse.com/1179317
https://bugzilla.suse.com/1179321
https://bugzilla.suse.com/1179322
https://bugzilla.suse.com/1179327
https://bugzilla.suse.com/1179333
https://bugzilla.suse.com/1179336
https://bugzilla.suse.com/1179338
https://bugzilla.suse.com/1179339
https://bugzilla.suse.com/1179343
https://bugzilla.suse.com/1179345
https://bugzilla.suse.com/1179346
https://bugzilla.suse.com/1179347
https://bugzilla.suse.com/1179361
https://bugzilla.suse.com/1179362
https://bugzilla.suse.com/1179397
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung