{"affected":[{"ecosystem_specific":{"binaries":[{"ImageMagick":"6.4.3.6-7.65.1","ImageMagick-devel":"6.4.3.6-7.65.1","libMagick++-devel":"6.4.3.6-7.65.1","libMagick++1":"6.4.3.6-7.65.1","libMagickWand1":"6.4.3.6-7.65.1","libMagickWand1-32bit":"6.4.3.6-7.65.1","perl-PerlMagick":"6.4.3.6-7.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 11 SP4","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.3.6-7.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libMagickCore1":"6.4.3.6-7.65.1","libMagickCore1-32bit":"6.4.3.6-7.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.3.6-7.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libMagickCore1":"6.4.3.6-7.65.1","libMagickCore1-32bit":"6.4.3.6-7.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.3.6-7.65.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for ImageMagick fixes the following issues:\n\n- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)\n- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)\n- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)\n- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)\n- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)\n- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314).\n- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)\n- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319).\n- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320).\n- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)\n- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)\n- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)\n- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)\n- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326).\n- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433).\n- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435).\n- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)\n- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436).\n- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439).\n- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441).\n- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)\n\nThis update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).\n","id":"SUSE-SU-2017:0586-1","modified":"2017-03-01T15:51:34Z","published":"2017-03-01T15:51:34Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20170586-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017308"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017310"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017311"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017312"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017314"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017318"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017319"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017320"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017321"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017322"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017324"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017326"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017421"},{"type":"REPORT","url":"https://bugzilla.suse.com/1020433"},{"type":"REPORT","url":"https://bugzilla.suse.com/1020435"},{"type":"REPORT","url":"https://bugzilla.suse.com/1020436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1020439"},{"type":"REPORT","url":"https://bugzilla.suse.com/1020441"},{"type":"REPORT","url":"https://bugzilla.suse.com/1020443"},{"type":"REPORT","url":"https://bugzilla.suse.com/1020448"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10046"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10048"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10049"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10050"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10052"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10059"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10060"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10065"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10068"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10070"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10071"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10144"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5506"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5507"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5508"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5511"}],"related":["CVE-2016-10046","CVE-2016-10048","CVE-2016-10049","CVE-2016-10050","CVE-2016-10051","CVE-2016-10052","CVE-2016-10059","CVE-2016-10060","CVE-2016-10063","CVE-2016-10064","CVE-2016-10065","CVE-2016-10068","CVE-2016-10070","CVE-2016-10071","CVE-2016-10144","CVE-2016-10145","CVE-2016-10146","CVE-2017-5506","CVE-2017-5507","CVE-2017-5508","CVE-2017-5511"],"summary":"Security update for ImageMagick","upstream":["CVE-2016-10046","CVE-2016-10048","CVE-2016-10049","CVE-2016-10050","CVE-2016-10051","CVE-2016-10052","CVE-2016-10059","CVE-2016-10060","CVE-2016-10063","CVE-2016-10064","CVE-2016-10065","CVE-2016-10068","CVE-2016-10070","CVE-2016-10071","CVE-2016-10144","CVE-2016-10145","CVE-2016-10146","CVE-2017-5506","CVE-2017-5507","CVE-2017-5508","CVE-2017-5511"]}