Security update for GraphicsMagick

SUSE Security Update: Security update for GraphicsMagick
Announcement ID: SUSE-SU-2016:1276-1
Rating: moderate
References: #978061
Affected Products:
  • SUSE Studio Onsite 1.3
  • SUSE Linux Enterprise Software Development Kit 11-SP4
  • SUSE Linux Enterprise Debuginfo 11-SP4

  • An update that fixes four vulnerabilities is now available.

    Description:


    This update for GraphicsMagick fixes the following issues:

    - Security update Remote Code Execution / Local File read [bsc#978061]
    CVE-2016-3714, CVE-2016-3715, CVE-2016-3717, CVE-2016-3718
    - CVE-2016-3714: Insufficient shell characters filtering leads to
    (potentially remote) code execution
    - CVE-2016-3715: Possible file deletion by using GraphicsMagick's 'tmp:'
    file specification syntax.
    - CVE-2016-3717: Possible local file read by using GraphicsMagick's 'txt:'
    file specification syntax.
    - CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make HTTP
    GET or FTP request.

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Studio Onsite 1.3:
      zypper in -t patch slestso13-GraphicsMagick-12548=1
    • SUSE Linux Enterprise Software Development Kit 11-SP4:
      zypper in -t patch sdksp4-GraphicsMagick-12548=1
    • SUSE Linux Enterprise Debuginfo 11-SP4:
      zypper in -t patch dbgsp4-GraphicsMagick-12548=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Studio Onsite 1.3 (x86_64):
      • GraphicsMagick-1.2.5-4.35.1
      • libGraphicsMagick2-1.2.5-4.35.1
    • SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      • GraphicsMagick-1.2.5-4.35.1
      • libGraphicsMagick2-1.2.5-4.35.1
      • perl-GraphicsMagick-1.2.5-4.35.1
    • SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      • GraphicsMagick-debuginfo-1.2.5-4.35.1
      • GraphicsMagick-debugsource-1.2.5-4.35.1

    References: