Security update for ImageMagick

SUSE Security Update: Security update for ImageMagick
Announcement ID: SUSE-SU-2018:0055-1
Rating: moderate
References: #1042948 #1049373 #1051412 #1052252 #1052771 #1058082 #1072902 #1074122 #1074425 #1074610
Affected Products:
  • SUSE Linux Enterprise Workstation Extension 12-SP3
  • SUSE Linux Enterprise Workstation Extension 12-SP2
  • SUSE Linux Enterprise Software Development Kit 12-SP3
  • SUSE Linux Enterprise Software Development Kit 12-SP2
  • SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
  • SUSE Linux Enterprise Server 12-SP3
  • SUSE Linux Enterprise Server 12-SP2
  • SUSE Linux Enterprise Desktop 12-SP3
  • SUSE Linux Enterprise Desktop 12-SP2

  • An update that fixes 10 vulnerabilities is now available.

    Description:

    This update for ImageMagick fixes several issues.

    These security issues were fixed:

    - CVE-2017-1000476: A CPU exhaustion vulnerability was found in the
    function ReadDDSInfo in coders/dds.c, which allowed attackers to cause a
    denial of service (bsc#1074610).
    - CVE-2017-9409: The ReadMPCImage function in mpc.c allowed attackers to
    cause a denial of service (memory leak) via a crafted file (bsc#1042948).
    - CVE-2017-1000445: A NULL pointer dereference in the MagickCore component
    might have lead to denial of service (bsc#1074425).
    - CVE-2017-17680: Prevent a memory leak in the function ReadXPMImage in
    coders/xpm.c, which allowed attackers to cause a denial of service via a
    crafted XPM image file (a different vulnerability than CVE-2017-17882)
    (bsc#1072902).
    - CVE-2017-17882: Prevent a memory leak in the function ReadXPMImage in
    coders/xpm.c, which allowed attackers to cause a denial of service via a
    crafted XPM image file (a different vulnerability than CVE-2017-17680)
    (bsc#1074122).
    - CVE-2017-11449: coders/mpc did not enable seekable streams and thus
    could not validate blob sizes, which allowed remote attackers to cause a
    denial of service (application crash) or possibly have unspecified other
    impact via an image received from stdin (bsc#1049373).
    - CVE-2017-12430: A memory exhaustion in the function ReadMPCImage in
    coders/mpc.c allowed attackers to cause DoS (bsc#1052252).
    - CVE-2017-12642: Prevent a memory leak vulnerability in ReadMPCImage in
    coders\mpc.c via crafted file allowing for DoS (bsc#1052771).
    - CVE-2017-14249: A mishandled EOF check in ReadMPCImage in coders/mpc.c
    that lead to a division by zero in GetPixelCacheTileSize in
    MagickCore/cache.c allowed remote attackers to cause a denial of service
    via a crafted file (bsc#1058082).
    - Prevent memory leak via crafted file in pwp.c allowing for DoS
    (bsc#1051412)

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Workstation Extension 12-SP3:
      zypper in -t patch SUSE-SLE-WE-12-SP3-2018-41=1
    • SUSE Linux Enterprise Workstation Extension 12-SP2:
      zypper in -t patch SUSE-SLE-WE-12-SP2-2018-41=1
    • SUSE Linux Enterprise Software Development Kit 12-SP3:
      zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-41=1
    • SUSE Linux Enterprise Software Development Kit 12-SP2:
      zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-41=1
    • SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
      zypper in -t patch SUSE-SLE-RPI-12-SP2-2018-41=1
    • SUSE Linux Enterprise Server 12-SP3:
      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-41=1
    • SUSE Linux Enterprise Server 12-SP2:
      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-41=1
    • SUSE Linux Enterprise Desktop 12-SP3:
      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-41=1
    • SUSE Linux Enterprise Desktop 12-SP2:
      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2018-41=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64):
      • ImageMagick-6.8.8.1-71.23.1
      • ImageMagick-debuginfo-6.8.8.1-71.23.1
      • ImageMagick-debugsource-6.8.8.1-71.23.1
      • libMagick++-6_Q16-3-6.8.8.1-71.23.1
      • libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.23.1
    • SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
      • ImageMagick-6.8.8.1-71.23.1
      • ImageMagick-debuginfo-6.8.8.1-71.23.1
      • ImageMagick-debugsource-6.8.8.1-71.23.1
      • libMagick++-6_Q16-3-6.8.8.1-71.23.1
      • libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.23.1
    • SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
      • ImageMagick-6.8.8.1-71.23.1
      • ImageMagick-debuginfo-6.8.8.1-71.23.1
      • ImageMagick-debugsource-6.8.8.1-71.23.1
      • ImageMagick-devel-6.8.8.1-71.23.1
      • libMagick++-6_Q16-3-6.8.8.1-71.23.1
      • libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
      • libMagick++-devel-6.8.8.1-71.23.1
      • perl-PerlMagick-6.8.8.1-71.23.1
      • perl-PerlMagick-debuginfo-6.8.8.1-71.23.1
    • SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
      • ImageMagick-6.8.8.1-71.23.1
      • ImageMagick-debuginfo-6.8.8.1-71.23.1
      • ImageMagick-debugsource-6.8.8.1-71.23.1
      • ImageMagick-devel-6.8.8.1-71.23.1
      • libMagick++-6_Q16-3-6.8.8.1-71.23.1
      • libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
      • libMagick++-devel-6.8.8.1-71.23.1
      • perl-PerlMagick-6.8.8.1-71.23.1
      • perl-PerlMagick-debuginfo-6.8.8.1-71.23.1
    • SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
      • ImageMagick-debuginfo-6.8.8.1-71.23.1
      • ImageMagick-debugsource-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
      • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
      • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
      • ImageMagick-debuginfo-6.8.8.1-71.23.1
      • ImageMagick-debugsource-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
      • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
      • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
      • ImageMagick-debuginfo-6.8.8.1-71.23.1
      • ImageMagick-debugsource-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
      • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
      • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
      • ImageMagick-6.8.8.1-71.23.1
      • ImageMagick-debuginfo-6.8.8.1-71.23.1
      • ImageMagick-debugsource-6.8.8.1-71.23.1
      • libMagick++-6_Q16-3-6.8.8.1-71.23.1
      • libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
      • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
      • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1
    • SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
      • ImageMagick-6.8.8.1-71.23.1
      • ImageMagick-debuginfo-6.8.8.1-71.23.1
      • ImageMagick-debugsource-6.8.8.1-71.23.1
      • libMagick++-6_Q16-3-6.8.8.1-71.23.1
      • libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-32bit-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.23.1
      • libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.23.1
      • libMagickWand-6_Q16-1-6.8.8.1-71.23.1
      • libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.23.1

    References: