Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2016:1260-1: important: Security update for ImageMagick

Recommended Posts

SUSE Security Update: Security update for ImageMagick

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2016:1260-1

Rating: important

References: #978061

Cross-References: CVE-2016-3714 CVE-2016-3715 CVE-2016-3716

CVE-2016-3717 CVE-2016-3718

Affected Products:

SUSE Linux Enterprise Workstation Extension 12-SP1

SUSE Linux Enterprise Workstation Extension 12

SUSE Linux Enterprise Software Development Kit 12-SP1

SUSE Linux Enterprise Software Development Kit 12

SUSE Linux Enterprise Server 12-SP1

SUSE Linux Enterprise Server 12

SUSE Linux Enterprise Desktop 12-SP1

SUSE Linux Enterprise Desktop 12

______________________________________________________________________________

 

An update that fixes 5 vulnerabilities is now available.

 

Description:

 

 

This update for ImageMagick fixes the following issues:

 

Security issues fixed:

- Several coders were vulnerable to remote code execution attacks, these

coders have now been disabled by default but can be re-enabled by

editing "/etc/ImageMagick-*/policy.xml" (bsc#978061)

- CVE-2016-3714: Insufficient shell characters filtering leads to

(potentially remote) code execution

- CVE-2016-3715: Possible file deletion by using ImageMagick's 'ephemeral'

pseudo protocol which deletes files after reading.

- CVE-2016-3716: Possible file moving by using ImageMagick's 'msl' pseudo

protocol with any extension in any folder.

- CVE-2016-3717: Possible local file read by using ImageMagick's 'label'

pseudo protocol to get content of the files from the server.

- CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make HTTP

GET or FTP request.

 

Bugs fixed:

- Use external svg loader (rsvg)

 

 

Patch Instructions:

 

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- SUSE Linux Enterprise Workstation Extension 12-SP1:

 

zypper in -t patch SUSE-SLE-WE-12-SP1-2016-733=1

 

- SUSE Linux Enterprise Workstation Extension 12:

 

zypper in -t patch SUSE-SLE-WE-12-2016-733=1

 

- SUSE Linux Enterprise Software Development Kit 12-SP1:

 

zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-733=1

 

- SUSE Linux Enterprise Software Development Kit 12:

 

zypper in -t patch SUSE-SLE-SDK-12-2016-733=1

 

- SUSE Linux Enterprise Server 12-SP1:

 

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-733=1

 

- SUSE Linux Enterprise Server 12:

 

zypper in -t patch SUSE-SLE-SERVER-12-2016-733=1

 

- SUSE Linux Enterprise Desktop 12-SP1:

 

zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-733=1

 

- SUSE Linux Enterprise Desktop 12:

 

zypper in -t patch SUSE-SLE-DESKTOP-12-2016-733=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):

 

ImageMagick-6.8.8.1-19.1

ImageMagick-debuginfo-6.8.8.1-19.1

ImageMagick-debugsource-6.8.8.1-19.1

libMagick++-6_Q16-3-6.8.8.1-19.1

libMagick++-6_Q16-3-debuginfo-6.8.8.1-19.1

libMagickCore-6_Q16-1-32bit-6.8.8.1-19.1

libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-19.1

 

- SUSE Linux Enterprise Workstation Extension 12 (x86_64):

 

ImageMagick-6.8.8.1-19.1

ImageMagick-debuginfo-6.8.8.1-19.1

ImageMagick-debugsource-6.8.8.1-19.1

libMagick++-6_Q16-3-6.8.8.1-19.1

libMagick++-6_Q16-3-debuginfo-6.8.8.1-19.1

libMagickCore-6_Q16-1-32bit-6.8.8.1-19.1

libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-19.1

 

- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

 

ImageMagick-6.8.8.1-19.1

ImageMagick-debuginfo-6.8.8.1-19.1

ImageMagick-debugsource-6.8.8.1-19.1

ImageMagick-devel-6.8.8.1-19.1

libMagick++-6_Q16-3-6.8.8.1-19.1

libMagick++-6_Q16-3-debuginfo-6.8.8.1-19.1

libMagick++-devel-6.8.8.1-19.1

perl-PerlMagick-6.8.8.1-19.1

perl-PerlMagick-debuginfo-6.8.8.1-19.1

 

- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):

 

ImageMagick-6.8.8.1-19.1

ImageMagick-debuginfo-6.8.8.1-19.1

ImageMagick-debugsource-6.8.8.1-19.1

ImageMagick-devel-6.8.8.1-19.1

libMagick++-6_Q16-3-6.8.8.1-19.1

libMagick++-6_Q16-3-debuginfo-6.8.8.1-19.1

libMagick++-devel-6.8.8.1-19.1

perl-PerlMagick-6.8.8.1-19.1

perl-PerlMagick-debuginfo-6.8.8.1-19.1

 

- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):

 

ImageMagick-debuginfo-6.8.8.1-19.1

ImageMagick-debugsource-6.8.8.1-19.1

libMagickCore-6_Q16-1-6.8.8.1-19.1

libMagickCore-6_Q16-1-debuginfo-6.8.8.1-19.1

libMagickWand-6_Q16-1-6.8.8.1-19.1

libMagickWand-6_Q16-1-debuginfo-6.8.8.1-19.1

 

- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):

 

ImageMagick-debuginfo-6.8.8.1-19.1

ImageMagick-debugsource-6.8.8.1-19.1

libMagickCore-6_Q16-1-6.8.8.1-19.1

libMagickCore-6_Q16-1-debuginfo-6.8.8.1-19.1

libMagickWand-6_Q16-1-6.8.8.1-19.1

libMagickWand-6_Q16-1-debuginfo-6.8.8.1-19.1

 

- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

 

ImageMagick-6.8.8.1-19.1

ImageMagick-debuginfo-6.8.8.1-19.1

ImageMagick-debugsource-6.8.8.1-19.1

libMagick++-6_Q16-3-6.8.8.1-19.1

libMagick++-6_Q16-3-debuginfo-6.8.8.1-19.1

libMagickCore-6_Q16-1-32bit-6.8.8.1-19.1

libMagickCore-6_Q16-1-6.8.8.1-19.1

libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-19.1

libMagickCore-6_Q16-1-debuginfo-6.8.8.1-19.1

libMagickWand-6_Q16-1-6.8.8.1-19.1

libMagickWand-6_Q16-1-debuginfo-6.8.8.1-19.1

 

- SUSE Linux Enterprise Desktop 12 (x86_64):

 

ImageMagick-6.8.8.1-19.1

ImageMagick-debuginfo-6.8.8.1-19.1

ImageMagick-debugsource-6.8.8.1-19.1

libMagick++-6_Q16-3-6.8.8.1-19.1

libMagick++-6_Q16-3-debuginfo-6.8.8.1-19.1

libMagickCore-6_Q16-1-32bit-6.8.8.1-19.1

libMagickCore-6_Q16-1-6.8.8.1-19.1

libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-19.1

libMagickCore-6_Q16-1-debuginfo-6.8.8.1-19.1

libMagickWand-6_Q16-1-6.8.8.1-19.1

libMagickWand-6_Q16-1-debuginfo-6.8.8.1-19.1

 

 

References:

 

https://www.suse.com/security/cve/CVE-2016-3714.html

https://www.suse.com/security/cve/CVE-2016-3715.html

https://www.suse.com/security/cve/CVE-2016-3716.html

https://www.suse.com/security/cve/CVE-2016-3717.html

https://www.suse.com/security/cve/CVE-2016-3718.html

https://bugzilla.suse.com/978061

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×