An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for ImageMagick fixes the following issues:
Security issues fixed:
CVE-2019-9956: Fixed a stack-based buffer overflow in PopHexPixel()
(bsc#1130330).
CVE-2019-10650: Fixed a heap-based buffer over-read in WriteTIFFImage()
(bsc#1131317).
CVE-2019-11007: Fixed a heap-based buffer overflow in ReadMNGImage()
(bsc#1132060).
CVE-2019-11008: Fixed a heap-based buffer overflow in WriteXWDImage()
(bsc#1132054).
Added extra -config- packages with Postscript/EPS/PDF readers still
enabled.
Removing the PS decoders is used to harden ImageMagick against security
issues within ghostscript. Enabling them might impact security.
(bsc#1122033)
These are two packages that can be selected:
Depending on your local needs install either one of them. The default is
the -SUSE configuration.
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-1331=1
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE Leap | 15.0 | i586 | < - openSUSE Leap 15.0 (i586 x86_64): | - openSUSE Leap 15.0 (i586 x86_64):.i586.rpm | |
openSUSE Leap | 15.0 | x86_64 | < - openSUSE Leap 15.0 (i586 x86_64): | - openSUSE Leap 15.0 (i586 x86_64):.x86_64.rpm | |
openSUSE Leap | 15.0 | noarch | < - openSUSE Leap 15.0 (noarch): | - openSUSE Leap 15.0 (noarch):.noarch.rpm | |
openSUSE Leap | 15.0 | x86_64 | < - openSUSE Leap 15.0 (x86_64): | - openSUSE Leap 15.0 (x86_64):.x86_64.rpm |