Lucene search

K
suseSuseOPENSUSE-SU-2019:1983-1
HistoryAug 21, 2019 - 12:00 a.m.

Security update for ImageMagick (moderate)

2019-08-2100:00:00
lists.opensuse.org
102

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

An update that fixes 30 vulnerabilities is now available.

Description:

This update for ImageMagick fixes the following issues:

  • CVE-2019-13301: Fixed a memory leak in AcquireMagickMemory()
    (bsc#1140554).
  • CVE-2019-13309: Fixed a memory leak at AcquireMagickMemory due to
    mishandling the NoSuchImage error in CLIListOperatorImages (bsc#1140520).
  • CVE-2019-13310: Fixed a memory leak at AcquireMagickMemory because of an
    error in MagickWand/mogrify.c (bsc#1140501).
  • CVE-2019-13311: Fixed a memory leak at AcquireMagickMemory because of a
    wand/mogrify.c error (bsc#1140513).
  • CVE-2019-13303: Fixed a heap-based buffer over-read in
    MagickCore/composite.c in CompositeImage (bsc#1140549).
  • CVE-2019-13296: Fixed a memory leak in AcquireMagickMemory because of an
    error in CLIListOperatorImages in MagickWand/operation.c (bsc#1140665).
  • CVE-2019-13299: Fixed a heap-based buffer over-read at
    MagickCore/pixel-accessor.h in GetPixelChannel (bsc#1140668).
  • CVE-2019-13454: Fixed a division by zero in RemoveDuplicateLayers in
    MagickCore/layer.c (bsc#1141171).
  • CVE-2019-13295: Fixed a heap-based buffer over-read at
    MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140664).
  • CVE-2019-13297: Fixed a heap-based buffer over-read at
    MagickCore/threshold.c in AdaptiveThresholdImage (bsc#1140666).
  • CVE-2019-12979: Fixed the use of uninitialized values in
    SyncImageSettings() (bsc#1139886).
  • CVE-2019-13391: Fixed a heap-based buffer over-read in
    MagickCore/fourier.c (bsc#1140673).
  • CVE-2019-13308: Fixed a heap-based buffer overflow in
    MagickCore/fourier.c (bsc#1140534).
  • CVE-2019-13302: Fixed a heap-based buffer over-read in
    MagickCore/fourier.c in ComplexImages (bsc#1140552).
  • CVE-2019-13298: Fixed a heap-based buffer overflow at
    MagickCore/pixel-accessor.h in SetPixelViaPixelInfo (bsc#1140667).
  • CVE-2019-13300: Fixed a heap-based buffer overflow at
    MagickCore/statistic.c in EvaluateImages (bsc#1140669).
  • CVE-2019-13307: Fixed a heap-based buffer overflow at
    MagickCore/statistic.c (bsc#1140538).
  • CVE-2019-12977: Fixed the use of uninitialized values in WriteJP2Imag()
    (bsc#1139884).
  • CVE-2019-12975: Fixed a memory leak in the WriteDPXImage() in
    coders/dpx.c (bsc#1140106).
  • CVE-2019-13135: Fixed the use of uninitialized values in ReadCUTImage()
    (bsc#1140103).
  • CVE-2019-12978: Fixed the use of uninitialized values in
    ReadPANGOImage() (bsc#1139885).
  • CVE-2019-12974: Fixed a NULL pointer dereference in the ReadPANGOImage()
    (bsc#1140111).
  • CVE-2019-13304: Fixed a stack-based buffer overflow at coders/pnm.c in
    WritePNMImage (bsc#1140547).
  • CVE-2019-13305: Fixed one more stack-based buffer overflow at
    coders/pnm.c in WritePNMImage (bsc#1140545).
  • CVE-2019-13306: Fixed an additional stack-based buffer overflow at
    coders/pnm.c in WritePNMImage (bsc#1140543).
  • CVE-2019-13133: Fixed a memory leak in the ReadBMPImage() (bsc#1140100).
  • CVE-2019-13134: Fixed a memory leak in the ReadVIFFImage() (bsc#1140102).
  • CVE-2019-13137: Fixed a memory leak in the ReadPSImage() (bsc#1140105).
  • CVE-2019-13136: Fixed a integer overflow vulnerability in the
    TIFFSeekCustomStream() (bsc#1140104).
  • CVE-2019-12976: Fixed a memory leak in the ReadPCLImage() in
    coders/pcl.c(bsc#1140110).

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2019-1983=1

  • openSUSE Leap 15.0:

    zypper in -t patch openSUSE-2019-1983=1

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P