Security update for ImageMagick

Announcement ID: SUSE-SU-2017:0529-1
Rating: moderate
References:
Cross-References:
CVSS scores:
  • CVE-2016-10046 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2016-10048 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  • CVE-2016-10049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10049 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10050 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10050 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10051 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10052 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10052 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10059 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10060 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2016-10060 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2016-10061 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2016-10061 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2016-10062 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2016-10063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10063 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10064 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10064 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10065 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2016-10068 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2016-10069 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2016-10070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2016-10070 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2016-10071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2016-10071 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2016-10144 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2016-10145 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2016-10146 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2017-5506 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2017-5506 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2017-5507 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2017-5507 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2017-5508 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2017-5510 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2017-5510 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2017-5511 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
  • SUSE Linux Enterprise Desktop 12 SP1
  • SUSE Linux Enterprise Desktop 12 SP2
  • SUSE Linux Enterprise High Performance Computing 12 SP2
  • SUSE Linux Enterprise Server 12 SP1
  • SUSE Linux Enterprise Server 12 SP2
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2
  • SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2
  • SUSE Linux Enterprise Software Development Kit 12 12-SP2
  • SUSE Linux Enterprise Software Development Kit 12 SP1
  • SUSE Linux Enterprise Workstation Extension 12 SP1
  • SUSE Linux Enterprise Workstation Extension 12 SP2

An update that solves 25 vulnerabilities can now be installed.

Description:

This update for ImageMagick fixes the following issues:

  • CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)
  • CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)
  • CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)
  • CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)
  • CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)
  • CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314)
  • CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)
  • CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319)
  • CVE-2016-10061: Improved error handling when writing files to not mask errors (bsc#1017319).
  • CVE-2016-10062: Improved error handling when writing files to not mask errors (bsc#1017319).
  • CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320)
  • CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)
  • CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)
  • CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)
  • CVE-2016-10069: Add check for invalid mat file (bsc#1017325).
  • CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
  • CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)
  • CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433)
  • CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435)
  • CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)
  • CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436)
  • CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439)
  • CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441)
  • CVE-2017-5510: Prevent out-of-bounds write when reading PSD files (bsc#1020446).
  • CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)

This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Desktop 12 SP1
    zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-273=1
  • SUSE Linux Enterprise Desktop 12 SP2
    zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-273=1
  • SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2
    zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-273=1
  • SUSE Linux Enterprise Software Development Kit 12 SP1
    zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-273=1
  • SUSE Linux Enterprise Software Development Kit 12 12-SP2
    zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-273=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1
    zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-273=1
  • SUSE Linux Enterprise Server 12 SP1
    zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-273=1
  • SUSE Linux Enterprise High Performance Computing 12 SP2
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-273=1
  • SUSE Linux Enterprise Server 12 SP2
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-273=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-273=1
  • SUSE Linux Enterprise Workstation Extension 12 SP1
    zypper in -t patch SUSE-SLE-WE-12-SP1-2017-273=1
  • SUSE Linux Enterprise Workstation Extension 12 SP2
    zypper in -t patch SUSE-SLE-WE-12-SP2-2017-273=1

Package List:

  • SUSE Linux Enterprise Desktop 12 SP1 (x86_64)
    • libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-59.1
    • ImageMagick-6.8.8.1-59.1
    • libMagick++-6_Q16-3-6.8.8.1-59.1
    • libMagick++-6_Q16-3-debuginfo-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-6.8.8.1-59.1
    • ImageMagick-debuginfo-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1
    • ImageMagick-debugsource-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-59.1
  • SUSE Linux Enterprise Desktop 12 SP2 (x86_64)
    • libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-59.1
    • ImageMagick-6.8.8.1-59.1
    • libMagick++-6_Q16-3-6.8.8.1-59.1
    • libMagick++-6_Q16-3-debuginfo-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-6.8.8.1-59.1
    • ImageMagick-debuginfo-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1
    • ImageMagick-debugsource-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-59.1
  • SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 (aarch64)
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-6.8.8.1-59.1
    • ImageMagick-debuginfo-6.8.8.1-59.1
    • ImageMagick-debugsource-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-59.1
  • SUSE Linux Enterprise Software Development Kit 12 SP1 (ppc64le s390x x86_64)
    • ImageMagick-6.8.8.1-59.1
    • libMagick++-6_Q16-3-6.8.8.1-59.1
    • libMagick++-6_Q16-3-debuginfo-6.8.8.1-59.1
    • perl-PerlMagick-debuginfo-6.8.8.1-59.1
    • ImageMagick-devel-6.8.8.1-59.1
    • ImageMagick-debuginfo-6.8.8.1-59.1
    • perl-PerlMagick-6.8.8.1-59.1
    • libMagick++-devel-6.8.8.1-59.1
    • ImageMagick-debugsource-6.8.8.1-59.1
  • SUSE Linux Enterprise Software Development Kit 12 12-SP2 (aarch64 ppc64le s390x x86_64)
    • ImageMagick-6.8.8.1-59.1
    • libMagick++-6_Q16-3-6.8.8.1-59.1
    • libMagick++-6_Q16-3-debuginfo-6.8.8.1-59.1
    • perl-PerlMagick-debuginfo-6.8.8.1-59.1
    • ImageMagick-devel-6.8.8.1-59.1
    • ImageMagick-debuginfo-6.8.8.1-59.1
    • perl-PerlMagick-6.8.8.1-59.1
    • libMagick++-devel-6.8.8.1-59.1
    • ImageMagick-debugsource-6.8.8.1-59.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1 (ppc64le x86_64)
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-6.8.8.1-59.1
    • ImageMagick-debuginfo-6.8.8.1-59.1
    • ImageMagick-debugsource-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-59.1
  • SUSE Linux Enterprise Server 12 SP1 (ppc64le s390x x86_64)
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-6.8.8.1-59.1
    • ImageMagick-debuginfo-6.8.8.1-59.1
    • ImageMagick-debugsource-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-59.1
  • SUSE Linux Enterprise High Performance Computing 12 SP2 (aarch64 x86_64)
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-6.8.8.1-59.1
    • ImageMagick-debuginfo-6.8.8.1-59.1
    • ImageMagick-debugsource-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-59.1
  • SUSE Linux Enterprise Server 12 SP2 (aarch64 ppc64le s390x x86_64)
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-6.8.8.1-59.1
    • ImageMagick-debuginfo-6.8.8.1-59.1
    • ImageMagick-debugsource-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-59.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2 (ppc64le x86_64)
    • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-6.8.8.1-59.1
    • ImageMagick-debuginfo-6.8.8.1-59.1
    • ImageMagick-debugsource-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-6.8.8.1-59.1
    • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-59.1
  • SUSE Linux Enterprise Workstation Extension 12 SP1 (x86_64)
    • libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-59.1
    • ImageMagick-6.8.8.1-59.1
    • libMagick++-6_Q16-3-6.8.8.1-59.1
    • libMagick++-6_Q16-3-debuginfo-6.8.8.1-59.1
    • ImageMagick-debuginfo-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1
    • ImageMagick-debugsource-6.8.8.1-59.1
  • SUSE Linux Enterprise Workstation Extension 12 SP2 (x86_64)
    • libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-59.1
    • ImageMagick-6.8.8.1-59.1
    • libMagick++-6_Q16-3-6.8.8.1-59.1
    • libMagick++-6_Q16-3-debuginfo-6.8.8.1-59.1
    • ImageMagick-debuginfo-6.8.8.1-59.1
    • libMagickCore-6_Q16-1-32bit-6.8.8.1-59.1
    • ImageMagick-debugsource-6.8.8.1-59.1

References: