drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in ImageMagick
Name: |
Mehrere Probleme in ImageMagick |
|
ID: |
SUSE-SU-2021:0156-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Module for Desktop Applications 15-SP1, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Enterprise Storage 6, SUSE CaaS Platform 4.0, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Server for SAP 15-SP1, SUSE Manager Server 4.0, SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS, SUSE Linux Enterprise Server 15-SP1-LTSS, SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS, SUSE Manager Proxy 4.0, SUSE Manager Retail Branch Server 4.0, SUSE Linux Enterprise Server 15-SP1-BCL |
|
Datum: |
Mo, 18. Januar 2021, 19:41 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766 |
|
Applikationen: |
ImageMagick |
|
Originalnachricht |
SUSE Security Update: Security update for ImageMagick ______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0156-1 Rating: moderate References: #1179103 #1179202 #1179208 #1179212 #1179221 #1179223 #1179240 #1179244 #1179260 #1179268 #1179269 #1179276 #1179278 #1179281 #1179285 #1179311 #1179312 #1179313 #1179315 #1179317 #1179321 #1179322 #1179327 #1179333 #1179336 #1179338 #1179339 #1179343 #1179345 #1179346 #1179347 #1179361 #1179362 #1179397 #1179753 Cross-References: CVE-2020-19667 CVE-2020-25664 CVE-2020-25665 CVE-2020-25666 CVE-2020-25674 CVE-2020-25675 CVE-2020-25676 CVE-2020-27750 CVE-2020-27751 CVE-2020-27752 CVE-2020-27753 CVE-2020-27754 CVE-2020-27755 CVE-2020-27756 CVE-2020-27757 CVE-2020-27758 CVE-2020-27759 CVE-2020-27760 CVE-2020-27761 CVE-2020-27762 CVE-2020-27763 CVE-2020-27764 CVE-2020-27765 CVE-2020-27766 CVE-2020-27767 CVE-2020-27768 CVE-2020-27769 CVE-2020-27770 CVE-2020-27771 CVE-2020-27772 CVE-2020-27773 CVE-2020-27774 CVE-2020-27775 CVE-2020-27776 CVE-2020-29599 Affected Products: SUSE Manager Server 4.0 SUSE Manager Retail Branch Server 4.0 SUSE Manager Proxy 4.0 SUSE Linux Enterprise Server for SAP 15-SP1 SUSE Linux Enterprise Server for SAP 15 SUSE Linux Enterprise Server 15-SP1-LTSS SUSE Linux Enterprise Server 15-SP1-BCL SUSE Linux Enterprise Server 15-LTSS SUSE Linux Enterprise Module for Development Tools 15-SP1 SUSE Linux Enterprise Module for Desktop Applications 15-SP1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise High Performance Computing 15-ESPOS SUSE Enterprise Storage 6 SUSE CaaS Platform 4.0 ______________________________________________________________________________
An update that fixes 35 vulnerabilities is now available.
Description:
This update for ImageMagick fixes the following issues:
- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103). - CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202). - CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208). - CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212). - CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223). - CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240). - CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244). - CVE-2020-27750: Fixed a division by zero in MagickCore/colorspace-private.h (bsc#1179260). - CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269). - CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346). - CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397). - CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336). - CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345). - CVE-2020-27756: Fixed a division by zero at MagickCore/geometry.c (bsc#1179221). - CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268). - CVE-2020-27758: Fixed an outside the range of representable values of type 'unsigned long long' (bsc#1179276). - CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313). - CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281). - CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315). - CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278). - CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312). - CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317). - CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311). - CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361). - CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322). - CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339). - CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321). - CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343). - CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327). - CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347). - CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285). - CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333). - CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338). - CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362). - CVE-2020-29599: Fixed a shell command injection in -authenticate (bsc#1179753).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Manager Server 4.0:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-156=1
- SUSE Manager Retail Branch Server 4.0:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-156=1
- SUSE Manager Proxy 4.0:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-156=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2021-156=1
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2021-156=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-156=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2021-156=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2021-156=1
- SUSE Linux Enterprise Module for Development Tools 15-SP1:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP1-2021-156=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP1:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP1-2021-156=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-156=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-156=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2021-156=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2021-156=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2021-156=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way.
Package List:
- SUSE Manager Server 4.0 (ppc64le s390x x86_64):
ImageMagick-7.0.7.34-3.90.1 ImageMagick-config-7-SUSE-7.0.7.34-3.90.1 ImageMagick-config-7-upstream-7.0.7.34-3.90.1 ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 ImageMagick-devel-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.90.1 libMagick++-devel-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Manager Retail Branch Server 4.0 (x86_64):
ImageMagick-7.0.7.34-3.90.1 ImageMagick-config-7-SUSE-7.0.7.34-3.90.1 ImageMagick-config-7-upstream-7.0.7.34-3.90.1 ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 ImageMagick-devel-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.90.1 libMagick++-devel-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Manager Proxy 4.0 (x86_64):
ImageMagick-7.0.7.34-3.90.1 ImageMagick-config-7-SUSE-7.0.7.34-3.90.1 ImageMagick-config-7-upstream-7.0.7.34-3.90.1 ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 ImageMagick-devel-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.90.1 libMagick++-devel-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
ImageMagick-7.0.7.34-3.90.1 ImageMagick-config-7-SUSE-7.0.7.34-3.90.1 ImageMagick-config-7-upstream-7.0.7.34-3.90.1 ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 ImageMagick-devel-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.90.1 libMagick++-devel-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
ImageMagick-7.0.7.34-3.90.1 ImageMagick-config-7-SUSE-7.0.7.34-3.90.1 ImageMagick-config-7-upstream-7.0.7.34-3.90.1 ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 ImageMagick-devel-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.90.1 libMagick++-devel-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
ImageMagick-7.0.7.34-3.90.1 ImageMagick-config-7-SUSE-7.0.7.34-3.90.1 ImageMagick-config-7-upstream-7.0.7.34-3.90.1 ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 ImageMagick-devel-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.90.1 libMagick++-devel-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Linux Enterprise Module for Development Tools 15-SP1 (aarch64 ppc64le s390x x86_64):
ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP1 (aarch64 ppc64le s390x x86_64):
ImageMagick-7.0.7.34-3.90.1 ImageMagick-config-7-SUSE-7.0.7.34-3.90.1 ImageMagick-config-7-upstream-7.0.7.34-3.90.1 ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 ImageMagick-devel-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.90.1 libMagick++-devel-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
ImageMagick-7.0.7.34-3.90.1 ImageMagick-config-7-SUSE-7.0.7.34-3.90.1 ImageMagick-config-7-upstream-7.0.7.34-3.90.1 ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 ImageMagick-devel-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.90.1 libMagick++-devel-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
ImageMagick-7.0.7.34-3.90.1 ImageMagick-config-7-SUSE-7.0.7.34-3.90.1 ImageMagick-config-7-upstream-7.0.7.34-3.90.1 ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 ImageMagick-devel-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.90.1 libMagick++-devel-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
ImageMagick-7.0.7.34-3.90.1 ImageMagick-config-7-SUSE-7.0.7.34-3.90.1 ImageMagick-config-7-upstream-7.0.7.34-3.90.1 ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 ImageMagick-devel-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.90.1 libMagick++-devel-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
- SUSE CaaS Platform 4.0 (x86_64):
ImageMagick-7.0.7.34-3.90.1 ImageMagick-config-7-SUSE-7.0.7.34-3.90.1 ImageMagick-config-7-upstream-7.0.7.34-3.90.1 ImageMagick-debuginfo-7.0.7.34-3.90.1 ImageMagick-debugsource-7.0.7.34-3.90.1 ImageMagick-devel-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-7.0.7.34-3.90.1 libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-3.90.1 libMagick++-devel-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-7.0.7.34-3.90.1 libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-3.90.1 perl-PerlMagick-7.0.7.34-3.90.1 perl-PerlMagick-debuginfo-7.0.7.34-3.90.1
References:
https://www.suse.com/security/cve/CVE-2020-19667.html https://www.suse.com/security/cve/CVE-2020-25664.html https://www.suse.com/security/cve/CVE-2020-25665.html https://www.suse.com/security/cve/CVE-2020-25666.html https://www.suse.com/security/cve/CVE-2020-25674.html https://www.suse.com/security/cve/CVE-2020-25675.html https://www.suse.com/security/cve/CVE-2020-25676.html https://www.suse.com/security/cve/CVE-2020-27750.html https://www.suse.com/security/cve/CVE-2020-27751.html https://www.suse.com/security/cve/CVE-2020-27752.html https://www.suse.com/security/cve/CVE-2020-27753.html https://www.suse.com/security/cve/CVE-2020-27754.html https://www.suse.com/security/cve/CVE-2020-27755.html https://www.suse.com/security/cve/CVE-2020-27756.html https://www.suse.com/security/cve/CVE-2020-27757.html https://www.suse.com/security/cve/CVE-2020-27758.html https://www.suse.com/security/cve/CVE-2020-27759.html https://www.suse.com/security/cve/CVE-2020-27760.html https://www.suse.com/security/cve/CVE-2020-27761.html https://www.suse.com/security/cve/CVE-2020-27762.html https://www.suse.com/security/cve/CVE-2020-27763.html https://www.suse.com/security/cve/CVE-2020-27764.html https://www.suse.com/security/cve/CVE-2020-27765.html https://www.suse.com/security/cve/CVE-2020-27766.html https://www.suse.com/security/cve/CVE-2020-27767.html https://www.suse.com/security/cve/CVE-2020-27768.html https://www.suse.com/security/cve/CVE-2020-27769.html https://www.suse.com/security/cve/CVE-2020-27770.html https://www.suse.com/security/cve/CVE-2020-27771.html https://www.suse.com/security/cve/CVE-2020-27772.html https://www.suse.com/security/cve/CVE-2020-27773.html https://www.suse.com/security/cve/CVE-2020-27774.html https://www.suse.com/security/cve/CVE-2020-27775.html https://www.suse.com/security/cve/CVE-2020-27776.html https://www.suse.com/security/cve/CVE-2020-29599.html https://bugzilla.suse.com/1179103 https://bugzilla.suse.com/1179202 https://bugzilla.suse.com/1179208 https://bugzilla.suse.com/1179212 https://bugzilla.suse.com/1179221 https://bugzilla.suse.com/1179223 https://bugzilla.suse.com/1179240 https://bugzilla.suse.com/1179244 https://bugzilla.suse.com/1179260 https://bugzilla.suse.com/1179268 https://bugzilla.suse.com/1179269 https://bugzilla.suse.com/1179276 https://bugzilla.suse.com/1179278 https://bugzilla.suse.com/1179281 https://bugzilla.suse.com/1179285 https://bugzilla.suse.com/1179311 https://bugzilla.suse.com/1179312 https://bugzilla.suse.com/1179313 https://bugzilla.suse.com/1179315 https://bugzilla.suse.com/1179317 https://bugzilla.suse.com/1179321 https://bugzilla.suse.com/1179322 https://bugzilla.suse.com/1179327 https://bugzilla.suse.com/1179333 https://bugzilla.suse.com/1179336 https://bugzilla.suse.com/1179338 https://bugzilla.suse.com/1179339 https://bugzilla.suse.com/1179343 https://bugzilla.suse.com/1179345 https://bugzilla.suse.com/1179346 https://bugzilla.suse.com/1179347 https://bugzilla.suse.com/1179361 https://bugzilla.suse.com/1179362 https://bugzilla.suse.com/1179397 https://bugzilla.suse.com/1179753
|
|
|
|