Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:Update
patchinfo.6947
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.6947
<patchinfo incident="6947"> <issue id="1083634" tracker="bnc">VUL-1: CVE-2017-18211: ImageMagick: NULL pointer dereference in the function saveBinaryCLProgram</issue> <issue id="1066170" tracker="bnc">VUL-1: CVE-2017-16353: GraphicsMagick, ImageMagick: Memory information disclosure in the DescribeImage function</issue> <issue id="1082362" tracker="bnc">VUL-0: CVE-2017-12692: ImageMagick: The ReadVIFFImage function in coders/viff.c in ImageMagick 7.0.6-6 allows remoteattackers to cause a denial of service (memory consumption) via a crafted VIFFfile.</issue> <issue id="1082291" tracker="bnc">VUL-1: CVE-2017-15016: GraphicsMagick, ImageMagick: NULL pointer dereference vulnerability in ReadEnhMetaFile in coders/emf.c</issue> <issue id="1066168" tracker="bnc">VUL-0: CVE-2017-16352: GraphicsMagick, ImageMagick: Heap buffer overflow in the "Display visual image directory" feature of the DescribeImage() function</issue> <issue id="1083628" tracker="bnc">VUL-1: CVE-2017-18209: ImageMagick: In the GetOpenCLCachedFilesDirectory function a NULL pointer dereference can occur</issue> <issue id="1082348" tracker="bnc">VUL-0: CVE-2017-12693: ImageMagick: The ReadBMPImage function in coders/bmp.c in ImageMagick 7.0.6-6 allows remoteattackers to cause a denial of service (memory consumption) via a crafted BMPfile.</issue> <issue id="1082283" tracker="bnc">VUL-1: CVE-2017-15017: GraphicsMagick, ImageMagick: NULL pointer dereference vulnerability in ReadOneMNGImage in coders/png.c</issue> <issue id="1082837" tracker="bnc">VUL-1: CVE-2018-7470: ImageMagick: An issue was discovered in ImageMagick 7.0.7-22 Q16. The IsWEBPImageLosslessfunction in coders/webp.c allows attackers to cause a denial of service(segmentation violation) via a crafted file.</issue> <issue id="1058630" tracker="bnc">VUL-1: GraphicsMagick: CVE-2017-14314 GraphicsMagick: Off-by-one error in the DrawImage function</issue> <issue id="1060382" tracker="bnc">VUL-2: CVE-2017-14739: ImageMagick: The AcquireResampleFilterThreadSet function in magick/resample-private.h NULL pointer dereference could lead to denial of service</issue> <issue id="1082792" tracker="bnc">VUL-1: CVE-2018-7443: ImageMagick: The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-23 Q16 does notproperly validate the amount of image data in a file, which allows remoteattackers to cause a denial of service (memory all</issue> <issue id="1059735" tracker="bnc">VUL-2: CVE-2017-14505: ImageMagick: NULL pointer dereference in DrawGetStrokeDashArray in wand/drawing-wand.c could lead to denial of service</issue> <issue id="1056434" tracker="bnc">VUL-2: CVE-2017-13768: ImageMagick: denial of service issue in function IdentifyImage in MagickCore/identify.c</issue> <issue id="1043290" tracker="bnc">VUL-2: CVE-2017-9500: ImageMagick: in version 7.0.5-8 Q16, an assertion failure was found in the functionResetImageProfileIterator, possibly leading to denial of service (miff.c)</issue> <issue id="1050087" tracker="bnc">VUL-2: CVE-2017-11524: GraphicsMagick, ImageMagick: WriteBlob in MagickCore/blob.c allows remote attackers to cause DoS</issue> <issue id="1086011" tracker="bnc">VUL-1: CVE-2018-8804: ImageMagick: WriteEPTImage allows attackers to cause a denial of service (double free and application crash)</issue> <issue id="2017-11524" tracker="cve" /> <issue id="2018-8804" tracker="cve" /> <issue id="2017-9500" tracker="cve" /> <issue id="2017-14505" tracker="cve" /> <issue id="2017-14739" tracker="cve" /> <issue id="2017-15016" tracker="cve" /> <issue id="2017-18209" tracker="cve" /> <issue id="2017-14314" tracker="cve" /> <issue id="2018-7443" tracker="cve" /> <issue id="2018-7470" tracker="cve" /> <issue id="2017-16352" tracker="cve" /> <issue id="2017-15017" tracker="cve" /> <issue id="2017-18211" tracker="cve" /> <issue id="2017-16353" tracker="cve" /> <issue id="2017-13768" tracker="cve" /> <issue id="2017-12693" tracker="cve" /> <issue id="2017-12692" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>pgajdos</packager> <description>This update for ImageMagick fixes several issues. These security issues were fixed: - CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact via a crafted file (bsc#1086011). - CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted file (bsc#1050087). - CVE-2017-18209: Prevent NULL pointer dereference in the GetOpenCLCachedFilesDirectory function caused by a memory allocation result that was not checked, related to GetOpenCLCacheDirectory (bsc#1083628). - CVE-2017-18211: Prevent NULL pointer dereference in the function saveBinaryCLProgram caused by a program-lookup result not being checked, related to CacheOpenCLKernel (bsc#1083634). - CVE-2017-9500: Prevent assertion failure in the function ResetImageProfileIterator, which allowed attackers to cause a denial of service via a crafted file (bsc#1043290). - CVE-2017-14739: The AcquireResampleFilterThreadSet function mishandled failed memory allocation, which allowed remote attackers to cause a denial of service (NULL Pointer Dereference in DistortImage in MagickCore/distort.c, and application crash) via unspecified vectors (bsc#1060382). - CVE-2017-16353: Prevent memory information disclosure in the DescribeImage function caused by a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments were never checked (bsc#1066170). - CVE-2017-16352: Prevent a heap-based buffer overflow in the "Display visual image directory" feature of the DescribeImage() function. One possible way to trigger the vulnerability is to run the identify command on a specially crafted MIFF format file with the verbose flag (bsc#1066168). - CVE-2017-14314: Prevent off-by-one error in the DrawImage function that allowed remote attackers to cause a denial of service (DrawDashPolygon heap-based buffer over-read and application crash) via a crafted file (bsc#1058630). - CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage function that allowed an attacker to perform denial of service by sending a crafted image file (bsc#1056434). - CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to perform Denial of Service (NULL pointer dereference and application crash in AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image File as input (bsc#1059735). - CVE-2018-7470: The IsWEBPImageLossless function allowed attackers to cause a denial of service (segmentation violation) via a crafted file (bsc#1082837). - CVE-2018-7443: The ReadTIFFImage function did not properly validate the amount of image data in a file, which allowed remote attackers to cause a denial of service (memory allocation failure in the AcquireMagickMemory function in MagickCore/memory.c) (bsc#1082792). - CVE-2017-15016: Prevent NULL pointer dereference vulnerability in ReadEnhMetaFile allowing for denial of service (bsc#1082291). - CVE-2017-15017: Prevent NULL pointer dereference vulnerability in ReadOneMNGImage allowing for denial of service (bsc#1082283). - CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362). - CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a denial of service (memory consumption) via a crafted BMP file (bsc#1082348). </description> <summary>Security update for ImageMagick</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor