File _patchinfo of Package patchinfo.3353

<patchinfo incident="3353">
  <issue id="1005328" tracker="bnc">VUL-0: CVE-2016-8677: ImageMagick: Memory allocation failure in AcquireQuantumPixels</issue>
  <issue id="1005127" tracker="bnc">VUL-0: CVE-2016-8683: GraphicsMagick: Check that filesize is reasonable compared to the header value</issue>
  <issue id="1005125" tracker="bnc">VUL-0: CVE-2016-8682: GraphicsMagick: Stack-buffer read overflow while reading SCT header</issue>
  <issue id="1005123" tracker="bnc">VUL-0: CVE-2016-8684: GraphicsMagick: Mismatch between real filesize and header values</issue>
  <issue id="1003629" tracker="bnc">VUL-0: CVE-2016-7996, CVE-2016-7997: GraphicsMagick: WPG Reader Issues</issue>
  <issue id="1002422" tracker="bnc">VUL-0: CVE-2016-7800: ImageMagick, GraphicsMagick: 8BIM/8BIMW unsigned underflow leads to heap overflow</issue>
  <issue id="1002421" tracker="bnc">VUL-0: CVE-2016-7799: ImageMagick: mogrify global buffer overflow</issue>
  <issue id="1002209" tracker="bnc">VUL-0: ImageMagick: Buffer overflows in SIXEL, PDB, MAP, and TIFF coders</issue>
  <issue id="1002206" tracker="bnc">VUL-0: ImageMagick: Divide by zero in WriteTIFFImage</issue>
  <issue id="1001221" tracker="bnc">VUL-0: CVE-2016-7101: ImageMagick,GraphicsMagick: SGI Coder Out-Of-Bounds Read Vulnerability</issue>
  <issue id="1001066" tracker="bnc">VUL-0: CVE-2016-6823: ImageMagick,GraphicsMagick: BMP Coder Out-Of-Bounds Write Vulnerability</issue>
  <issue id="1000715" tracker="bnc">VUL-0: CVE-2016-7539: ImageMagick: Potential DOS by not releasing memory</issue>
  <issue id="1000714" tracker="bnc">VUL-0: CVE-2014-9907: ImageMagick: DOS due to corrupted DDS files</issue>
  <issue id="1000713" tracker="bnc">VUL-0: CVE-2015-8959: ImageMagick: dOS due to corrupted DDS files</issue>
  <issue id="1000712" tracker="bnc">VUL-0: CVE-2016-7538: ImageMagick: SIGABRT for corrupted pdb file</issue>
  <issue id="1000711" tracker="bnc">VUL-0: CVE-2016-7537: ImageMagick: Out of bound access for corrupted pdb file</issue>
  <issue id="1000709" tracker="bnc">VUL-0: CVE-2016-7535: ImageMagick: Out of bound access for corrupted psd file</issue>
  <issue id="1000708" tracker="bnc">VUL-0: CVE-2016-7534: ImageMagick: Out of bound access in generic decoder</issue>
  <issue id="1000707" tracker="bnc">VUL-0: CVE-2016-7533: ImageMagick: Wpg file out of bound for corrupted file</issue>
  <issue id="1000706" tracker="bnc">VUL-0: CVE-2016-7532: ImageMagick: fix handling of corrupted psd file</issue>
  <issue id="1000704" tracker="bnc">VUL-0: CVE-2016-7531: ImageMagick: Pbd file out of bound access</issue>
  <issue id="1000703" tracker="bnc">VUL-0: CVE-2016-7530: ImageMagick: Out of bound in quantum handling</issue>
  <issue id="1000702" tracker="bnc">VUL-0: CVE-2016-7526: ImageMagick: out-of-bounds write in ./MagickCore/pixel-accessor.h</issue>
  <issue id="1000701" tracker="bnc">VUL-0: CVE-2016-7525: ImageMagick: Heap buffer overflow in psd file coder</issue>
  <issue id="1000700" tracker="bnc">VUL-0: CVE-2016-7524: ImageMagick: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465</issue>
  <issue id="1000699" tracker="bnc">VUL-0: CVE-2016-7523: ImageMagick: AddressSanitizer:heap-buffer-overflow READ of size 1 meta.c:496</issue>
  <issue id="1000698" tracker="bnc">VUL-0: CVE-2016-7522: ImageMagick: Out of bound access for malformed psd file</issue>
  <issue id="1000697" tracker="bnc">VUL-0: CVE-2016-7521: ImageMagick: Heap buffer overflow in psd file handling</issue>
  <issue id="1000696" tracker="bnc">VUL-0: CVE-2016-7520: ImageMagick: Heap overflow in hdr file handling</issue>
  <issue id="1000695" tracker="bnc">VUL-0: CVE-2016-7519: ImageMagick:  out-of-bounds read in coders/rle.c</issue>
  <issue id="1000694" tracker="bnc">VUL-0: CVE-2016-7518: ImageMagick: out-of-bounds read in coders/sun.c</issue>
  <issue id="1000693" tracker="bnc">VUL-0: CVE-2016-7517: ImageMagick: out-of-bounds read in coders/pict.c</issue>
  <issue id="1000692" tracker="bnc">VUL-0: CVE-2016-7516: ImageMagick: Out of bounds problem in rle, pict, viff and sun files</issue>
  <issue id="1000691" tracker="bnc">VUL-0: CVE-2015-8958: ImageMagick: Potential DOS in sun file handling due to malformed files</issue>
  <issue id="1000690" tracker="bnc">VUL-0: CVE-2015-8957: ImageMagick: Buffer overflow in sun file handling</issue>
  <issue id="1000689" tracker="bnc">VUL-0: CVE-2016-7515: ImageMagick: Rle file handling for corrupted file</issue>
  <issue id="1000688" tracker="bnc">VUL-0: CVE-2016-7514: ImageMagick: Out-of-bounds read in coders/psd.c</issue>
  <issue id="1000686" tracker="bnc">VUL-0: CVE-2016-7513: ImageMagick: Off-by-one error leading to segfault</issue>
  <issue id="1000436" tracker="bnc">VUL-0: CVE-2016-7527: ImageMagick:  out of bound access in wpg file coder:</issue>
  <issue id="1000434" tracker="bnc">VUL-0: CVE-2016-7528: ImageMagick: out of bound access in xcf file coder</issue>
  <issue id="1000399" tracker="bnc">VUL-0: CVE-2016-7529: ImageMagick: out of bound in quantum handling</issue>
  <issue id="1000394" tracker="bnc">VUL-0: CVE-2016-7540: ImageMagick: writing to RGF format aborts</issue>
  <issue id="2016-8684" tracker="cve" />
  <issue id="2016-8683" tracker="cve" />
  <issue id="2016-8682" tracker="cve" />
  <issue id="2016-8677" tracker="cve" />
  <issue id="2016-7997" tracker="cve" />
  <issue id="2016-7996" tracker="cve" />
  <issue id="2016-7800" tracker="cve" />
  <issue id="2016-7799" tracker="cve" />
  <issue id="2016-7540" tracker="cve" />
  <issue id="2016-7539" tracker="cve" />
  <issue id="2016-7538" tracker="cve" />
  <issue id="2016-7537" tracker="cve" />
  <issue id="2016-7535" tracker="cve" />
  <issue id="2016-7534" tracker="cve" />
  <issue id="2016-7533" tracker="cve" />
  <issue id="2016-7532" tracker="cve" />
  <issue id="2016-7531" tracker="cve" />
  <issue id="2016-7530" tracker="cve" />
  <issue id="2016-7529" tracker="cve" />
  <issue id="2016-7528" tracker="cve" />
  <issue id="2016-7527" tracker="cve" />
  <issue id="2016-7526" tracker="cve" />
  <issue id="2016-7525" tracker="cve" />
  <issue id="2016-7524" tracker="cve" />
  <issue id="2016-7523" tracker="cve" />
  <issue id="2016-7522" tracker="cve" />
  <issue id="2016-7521" tracker="cve" />
  <issue id="2016-7520" tracker="cve" />
  <issue id="2016-7519" tracker="cve" />
  <issue id="2016-7518" tracker="cve" />
  <issue id="2016-7517" tracker="cve" />
  <issue id="2016-7516" tracker="cve" />
  <issue id="2016-7515" tracker="cve" />
  <issue id="2016-7514" tracker="cve" />
  <issue id="2016-7513" tracker="cve" />
  <issue id="2016-7101" tracker="cve" />
  <issue id="2016-6823" tracker="cve" />
  <issue id="2015-8959" tracker="cve" />
  <issue id="2015-8958" tracker="cve" />
  <issue id="2015-8957" tracker="cve" />
  <issue id="2014-9907" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>pgajdos</packager>
  <description>
This update for ImageMagick fixes the following issues:
    
These vulnerabilities could be triggered by processing specially crafted image files,
which could lead to a process crash or resource consumtion, or potentially have
unspecified futher impact.

- CVE-2016-8684: Mismatch between real filesize and header values (bsc#1005123)
- CVE-2016-8683: Check that filesize is reasonable compared to the header value (bsc#1005127)
- CVE-2016-8682: Stack-buffer read overflow while reading SCT header (bsc#1005125)
- CVE-2016-8677: Memory allocation failure in AcquireQuantumPixels (bsc#1005328)
- CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629)
- CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow (bsc#1002422)
- CVE-2016-7799: mogrify global buffer overflow (bsc#1002421)
- CVE-2016-7540: writing to RGF format aborts (bsc#1000394)
- CVE-2016-7539: Potential DOS by not releasing memory (bsc#1000715)
- CVE-2016-7538: SIGABRT for corrupted pdb file (bsc#1000712)
- CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711)
- CVE-2016-7535: Out of bound access for corrupted psd file (bsc#1000709)
- CVE-2016-7534: Out of bound access in generic decoder (bsc#1000708)
- CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707)
- CVE-2016-7532: fix handling of corrupted psd file (bsc#1000706)
- CVE-2016-7531: Pbd file out of bound access (bsc#1000704)
- CVE-2016-7530: Out of bound in quantum handling (bsc#1000703)
- CVE-2016-7529: Out-of-bound in quantum handling (bsc#1000399)
- CVE-2016-7528: Out-of-bound access in xcf file coder (bsc#1000434)
- CVE-2016-7527: Out-of-bound access in wpg file coder: (bsc#1000436)
- CVE-2016-7526: out-of-bounds write in ./MagickCore/pixel-accessor.h (bsc#1000702)
- CVE-2016-7525: Heap buffer overflow in psd file coder (bsc#1000701)
- CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465 (bsc#1000700)
- CVE-2016-7523: AddressSanitizer:heap-buffer-overflow READ of size 1 meta.c:496 (bsc#1000699)
- CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698)
- CVE-2016-7521: Heap buffer overflow in psd file handling (bsc#1000697)
- CVE-2016-7520: Heap overflow in hdr file handling (bsc#1000696)
- CVE-2016-7519: Out-of-bounds read in coders/rle.c (bsc#1000695)
- CVE-2016-7518: Out-of-bounds read in coders/sun.c (bsc#1000694)
- CVE-2016-7517: Out-of-bounds read in coders/pict.c (bsc#1000693)
- CVE-2016-7516: Out-of-bounds problem in rle, pict, viff and sun files (bsc#1000692)
- CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689)
- CVE-2016-7514: Out-of-bounds read in coders/psd.c (bsc#1000688)
- CVE-2016-7513: Off-by-one error leading to segfault (bsc#1000686)
- CVE-2016-7101: raphicsMagick: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221)
- CVE-2016-6823: raphicsMagick: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066)
- CVE-2015-8959: dOS due to corrupted DDS files (bsc#1000713)
- CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691)
- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)
- CVE-2014-9907: DOS due to corrupted DDS files (bsc#1000714)
- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209)
- Divide by zero in WriteTIFFImage (bsc#1002206)
</description>
  <summary>Security update for ImageMagick</summary>
</patchinfo>

openSUSE Build Service is sponsored by