drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in ImageMagick
Name: |
Mehrere Probleme in ImageMagick |
|
ID: |
SUSE-SU-2019:1712-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Desktop 12-SP3, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Workstation Extension 12-SP3, SUSE Linux Enterprise Software Development Kit 12-SP3, SUSE Linux Enterprise Desktop 12-SP4, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Workstation Extension 12-SP4 |
|
Datum: |
Di, 25. Juni 2019, 23:15 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472 |
|
Applikationen: |
ImageMagick |
|
Originalnachricht |
SUSE Security Update: Security update for ImageMagick ______________________________________________________________________________
Announcement ID: SUSE-SU-2019:1712-1 Rating: moderate References: #1133204 #1133205 #1133498 #1133501 #1134075 #1135232 #1135236 #1136183 #1136732 #1138425 #1138464 Cross-References: CVE-2017-12805 CVE-2017-12806 CVE-2019-10131 CVE-2019-11470 CVE-2019-11472 CVE-2019-11505 CVE-2019-11506 CVE-2019-11597 CVE-2019-11598 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP4 SUSE Linux Enterprise Workstation Extension 12-SP3 SUSE Linux Enterprise Software Development Kit 12-SP4 SUSE Linux Enterprise Software Development Kit 12-SP3 SUSE Linux Enterprise Server 12-SP4 SUSE Linux Enterprise Server 12-SP3 SUSE Linux Enterprise Desktop 12-SP4 SUSE Linux Enterprise Desktop 12-SP3 ______________________________________________________________________________
An update that solves 9 vulnerabilities and has two fixes is now available.
Description:
This update for ImageMagick fixes the following issues:
Security issues fixed:
- CVE-2019-11597: Fixed a heap-based buffer over-read in the WriteTIFFImage() (bsc#1138464). - Fixed a file content disclosure via SVG and WMF decoding (bsc#1138425).- CVE-2019-11472: Fixed a denial of service in ReadXWDImage() (bsc#1133204). - CVE-2019-11470: Fixed a denial of service in ReadCINImage() (bsc#1133205). - CVE-2019-11506: Fixed a heap-based buffer overflow in the WriteMATLABImage() (bsc#1133498). - CVE-2019-11505: Fixed a heap-based buffer overflow in the WritePDBImage() (bsc#1133501). - CVE-2019-10131: Fixed a off-by-one read in formatIPTCfromBuffer function in coders/meta.c (bsc#1134075). - CVE-2017-12806: Fixed a denial of service through memory exhaustion in format8BIM() (bsc#1135232). - CVE-2017-12805: Fixed a denial of service through memory exhaustion in ReadTIFFImage() (bsc#1135236). - CVE-2019-11598: Fixed a heap-based buffer over-read in WritePNMImage() (bsc#1136732)
We also now disable PCL in the -SUSE configuration, as it also uses ghostscript for decoding (bsc#1136183)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP4:
zypper in -t patch SUSE-SLE-WE-12-SP4-2019-1712=1
- SUSE Linux Enterprise Workstation Extension 12-SP3:
zypper in -t patch SUSE-SLE-WE-12-SP3-2019-1712=1
- SUSE Linux Enterprise Software Development Kit 12-SP4:
zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-1712=1
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2019-1712=1
- SUSE Linux Enterprise Server 12-SP4:
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1712=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-1712=1
- SUSE Linux Enterprise Desktop 12-SP4:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1712=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2019-1712=1
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP4 (x86_64):
ImageMagick-6.8.8.1-71.123.2 ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 ImageMagick-config-6-upstream-6.8.8.1-71.123.2 ImageMagick-debuginfo-6.8.8.1-71.123.2 ImageMagick-debugsource-6.8.8.1-71.123.2 libMagick++-6_Q16-3-6.8.8.1-71.123.2 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.123.2
- SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64):
ImageMagick-6.8.8.1-71.123.2 ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 ImageMagick-config-6-upstream-6.8.8.1-71.123.2 ImageMagick-debuginfo-6.8.8.1-71.123.2 ImageMagick-debugsource-6.8.8.1-71.123.2 libMagick++-6_Q16-3-6.8.8.1-71.123.2 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.123.2
- SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64):
ImageMagick-6.8.8.1-71.123.2 ImageMagick-debuginfo-6.8.8.1-71.123.2 ImageMagick-debugsource-6.8.8.1-71.123.2 ImageMagick-devel-6.8.8.1-71.123.2 libMagick++-6_Q16-3-6.8.8.1-71.123.2 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.123.2 libMagick++-devel-6.8.8.1-71.123.2 perl-PerlMagick-6.8.8.1-71.123.2 perl-PerlMagick-debuginfo-6.8.8.1-71.123.2
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
ImageMagick-6.8.8.1-71.123.2 ImageMagick-debuginfo-6.8.8.1-71.123.2 ImageMagick-debugsource-6.8.8.1-71.123.2 ImageMagick-devel-6.8.8.1-71.123.2 libMagick++-6_Q16-3-6.8.8.1-71.123.2 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.123.2 libMagick++-devel-6.8.8.1-71.123.2 perl-PerlMagick-6.8.8.1-71.123.2 perl-PerlMagick-debuginfo-6.8.8.1-71.123.2
- SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):
ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 ImageMagick-config-6-upstream-6.8.8.1-71.123.2 ImageMagick-debuginfo-6.8.8.1-71.123.2 ImageMagick-debugsource-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.123.2 libMagickWand-6_Q16-1-6.8.8.1-71.123.2 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.123.2
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 ImageMagick-config-6-upstream-6.8.8.1-71.123.2 ImageMagick-debuginfo-6.8.8.1-71.123.2 ImageMagick-debugsource-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.123.2 libMagickWand-6_Q16-1-6.8.8.1-71.123.2 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.123.2
- SUSE Linux Enterprise Desktop 12-SP4 (x86_64):
ImageMagick-6.8.8.1-71.123.2 ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 ImageMagick-config-6-upstream-6.8.8.1-71.123.2 ImageMagick-debuginfo-6.8.8.1-71.123.2 ImageMagick-debugsource-6.8.8.1-71.123.2 libMagick++-6_Q16-3-6.8.8.1-71.123.2 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.123.2 libMagickWand-6_Q16-1-6.8.8.1-71.123.2 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.123.2
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
ImageMagick-6.8.8.1-71.123.2 ImageMagick-config-6-SUSE-6.8.8.1-71.123.2 ImageMagick-config-6-upstream-6.8.8.1-71.123.2 ImageMagick-debuginfo-6.8.8.1-71.123.2 ImageMagick-debugsource-6.8.8.1-71.123.2 libMagick++-6_Q16-3-6.8.8.1-71.123.2 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-32bit-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.123.2 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.123.2 libMagickWand-6_Q16-1-6.8.8.1-71.123.2 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.123.2
References:
https://www.suse.com/security/cve/CVE-2017-12805.html https://www.suse.com/security/cve/CVE-2017-12806.html https://www.suse.com/security/cve/CVE-2019-10131.html https://www.suse.com/security/cve/CVE-2019-11470.html https://www.suse.com/security/cve/CVE-2019-11472.html https://www.suse.com/security/cve/CVE-2019-11505.html https://www.suse.com/security/cve/CVE-2019-11506.html https://www.suse.com/security/cve/CVE-2019-11597.html https://www.suse.com/security/cve/CVE-2019-11598.html https://bugzilla.suse.com/1133204 https://bugzilla.suse.com/1133205 https://bugzilla.suse.com/1133498 https://bugzilla.suse.com/1133501 https://bugzilla.suse.com/1134075 https://bugzilla.suse.com/1135232 https://bugzilla.suse.com/1135236 https://bugzilla.suse.com/1136183 https://bugzilla.suse.com/1136732 https://bugzilla.suse.com/1138425 https://bugzilla.suse.com/1138464
_______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates
|
|
|
|