You are here
Home > Preporuke > Ranjivosti programskog paketa ImageMagick

Ranjivosti programskog paketa ImageMagick

  • Detalji os-a: LSU
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:1261-1
Rating: important
References: #978061
Cross-References: CVE-2016-3714 CVE-2016-3715 CVE-2016-3716
CVE-2016-3717 CVE-2016-3718
Affected Products:
openSUSE 13.2
______________________________________________________________________________

An update that fixes 5 vulnerabilities is now available.

Description:

This update for ImageMagick fixes the following issues:

The update disables various insecure coders [boo#978061] These fix issues
tracked in CVE-2016-3714, CVE-2016-3715, CVE-2016-3716, CVE-2016-3717,
CVE-2016-3718

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE 13.2:

zypper in -t patch openSUSE-2016-569=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE 13.2 (i586 x86_64):

ImageMagick-6.8.9.8-18.1
ImageMagick-debuginfo-6.8.9.8-18.1
ImageMagick-debugsource-6.8.9.8-18.1
ImageMagick-devel-6.8.9.8-18.1
ImageMagick-extra-6.8.9.8-18.1
ImageMagick-extra-debuginfo-6.8.9.8-18.1
libMagick++-6_Q16-5-6.8.9.8-18.1
libMagick++-6_Q16-5-debuginfo-6.8.9.8-18.1
libMagick++-devel-6.8.9.8-18.1
libMagickCore-6_Q16-2-6.8.9.8-18.1
libMagickCore-6_Q16-2-debuginfo-6.8.9.8-18.1
libMagickWand-6_Q16-2-6.8.9.8-18.1
libMagickWand-6_Q16-2-debuginfo-6.8.9.8-18.1
perl-PerlMagick-6.8.9.8-18.1
perl-PerlMagick-debuginfo-6.8.9.8-18.1

– openSUSE 13.2 (noarch):

ImageMagick-doc-6.8.9.8-18.1

– openSUSE 13.2 (x86_64):

ImageMagick-devel-32bit-6.8.9.8-18.1
libMagick++-6_Q16-5-32bit-6.8.9.8-18.1
libMagick++-6_Q16-5-debuginfo-32bit-6.8.9.8-18.1
libMagick++-devel-32bit-6.8.9.8-18.1
libMagickCore-6_Q16-2-32bit-6.8.9.8-18.1
libMagickCore-6_Q16-2-debuginfo-32bit-6.8.9.8-18.1
libMagickWand-6_Q16-2-32bit-6.8.9.8-18.1
libMagickWand-6_Q16-2-debuginfo-32bit-6.8.9.8-18.1

References:

https://www.suse.com/security/cve/CVE-2016-3714.html
https://www.suse.com/security/cve/CVE-2016-3715.html
https://www.suse.com/security/cve/CVE-2016-3716.html
https://www.suse.com/security/cve/CVE-2016-3717.html
https://www.suse.com/security/cve/CVE-2016-3718.html
https://bugzilla.suse.com/978061


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:1266-1
Rating: important
References: #978061
Cross-References: CVE-2016-3714 CVE-2016-3715 CVE-2016-3716
CVE-2016-3717 CVE-2016-3718
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________

An update that fixes 5 vulnerabilities is now available.

Description:

This update for ImageMagick fixes the following issues:

Security issues fixed:
– Several coders were vulnerable to remote code execution attacks, these
coders have now been disabled by default but can be re-enabled by
editing “/etc/ImageMagick-*/policy.xml” (bsc#978061)
– CVE-2016-3714: Insufficient shell characters filtering leads to
(potentially remote) code execution
– CVE-2016-3715: Possible file deletion by using ImageMagick’s ‘ephemeral’
pseudo protocol which deletes files after reading.
– CVE-2016-3716: Possible file moving by using ImageMagick’s ‘msl’ pseudo
protocol with any extension in any folder.
– CVE-2016-3717: Possible local file read by using ImageMagick’s ‘label’
pseudo protocol to get content of the files from the server.
– CVE-2016-3718: Possible Server Side Request Forgery (SSRF) to make HTTP
GET or FTP request.

Bugs fixed:
– Use external svg loader (rsvg)

This update was imported from the SUSE:SLE-12:Update update project.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.1:

zypper in -t patch openSUSE-2016-574=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.1 (i586 x86_64):

ImageMagick-6.8.8.1-9.1
ImageMagick-debuginfo-6.8.8.1-9.1
ImageMagick-debugsource-6.8.8.1-9.1
ImageMagick-devel-6.8.8.1-9.1
ImageMagick-extra-6.8.8.1-9.1
ImageMagick-extra-debuginfo-6.8.8.1-9.1
libMagick++-6_Q16-3-6.8.8.1-9.1
libMagick++-6_Q16-3-debuginfo-6.8.8.1-9.1
libMagick++-devel-6.8.8.1-9.1
libMagickCore-6_Q16-1-6.8.8.1-9.1
libMagickCore-6_Q16-1-debuginfo-6.8.8.1-9.1
libMagickWand-6_Q16-1-6.8.8.1-9.1
libMagickWand-6_Q16-1-debuginfo-6.8.8.1-9.1
perl-PerlMagick-6.8.8.1-9.1
perl-PerlMagick-debuginfo-6.8.8.1-9.1

– openSUSE Leap 42.1 (noarch):

ImageMagick-doc-6.8.8.1-9.1

– openSUSE Leap 42.1 (x86_64):

ImageMagick-devel-32bit-6.8.8.1-9.1
libMagick++-6_Q16-3-32bit-6.8.8.1-9.1
libMagick++-6_Q16-3-debuginfo-32bit-6.8.8.1-9.1
libMagick++-devel-32bit-6.8.8.1-9.1
libMagickCore-6_Q16-1-32bit-6.8.8.1-9.1
libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-9.1
libMagickWand-6_Q16-1-32bit-6.8.8.1-9.1
libMagickWand-6_Q16-1-debuginfo-32bit-6.8.8.1-9.1

References:

https://www.suse.com/security/cve/CVE-2016-3714.html
https://www.suse.com/security/cve/CVE-2016-3715.html
https://www.suse.com/security/cve/CVE-2016-3716.html
https://www.suse.com/security/cve/CVE-2016-3717.html
https://www.suse.com/security/cve/CVE-2016-3718.html
https://bugzilla.suse.com/978061


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorTomislav Protega
Cert idNCERT-REF-2016-05-0019-ADV
CveCVE-2016-3714 CVE-2016-3715 CVE-2016-3716 CVE-2016-3717 CVE-2016-3718
ID izvornikaopenSUSE-SU-2016:1261-1 openSUSE-SU-2016:1266-1
ProizvodSecurity update for ImageMagick
Izvorhttp://www.suse.com
Top
More in Preporuke
Višestruke ranjivosti jezgre operacijskog sustava

Otkrivene su višestruke ranjivosti u jezgri (linux-lts-xenial) operacijskog sustava Ubuntu 14.04 LTS. Zahvaćene su razne komponente, a ovisno o tipu...

Close