{"affected":[{"ecosystem_specific":{"binaries":[{"ImageMagick":"6.8.8.1-70.1","libMagick++-6_Q16-3":"6.8.8.1-70.1","libMagickCore-6_Q16-1":"6.8.8.1-70.1","libMagickCore-6_Q16-1-32bit":"6.8.8.1-70.1","libMagickWand-6_Q16-1":"6.8.8.1-70.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.8.8.1-70.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libMagickCore-6_Q16-1":"6.8.8.1-70.1","libMagickWand-6_Q16-1":"6.8.8.1-70.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.8.8.1-70.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ImageMagick":"6.8.8.1-70.1","ImageMagick-devel":"6.8.8.1-70.1","libMagick++-6_Q16-3":"6.8.8.1-70.1","libMagick++-devel":"6.8.8.1-70.1","perl-PerlMagick":"6.8.8.1-70.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP2","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.8.8.1-70.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libMagickCore-6_Q16-1":"6.8.8.1-70.1","libMagickWand-6_Q16-1":"6.8.8.1-70.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.8.8.1-70.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libMagickCore-6_Q16-1":"6.8.8.1-70.1","libMagickWand-6_Q16-1":"6.8.8.1-70.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.8.8.1-70.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ImageMagick":"6.8.8.1-70.1","libMagick++-6_Q16-3":"6.8.8.1-70.1","libMagickCore-6_Q16-1-32bit":"6.8.8.1-70.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 12 SP2","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.8.8.1-70.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for ImageMagick fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2017-6502: Possible file-descriptor leak in libmagickcore that could be triggered via a\n  specially crafted webp file (bsc#1028075).\n- CVE-2017-7943: The ReadSVGImage function in svg.c allowed remote attackers to consume an\n  amount of available memory via a crafted file (bsc#1034870). Note that this only impacts the\n  built-in SVG implementation. As we use the librsgv implementation, we are not affected.\n- CVE-2017-7942: The ReadAVSImage function in avs.c allowed remote attackers to consume an\n  amount of available memory via a crafted file (bsc#1034872).\n- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an\n  amount of available memory via a crafted file (bsc#1034876).\n- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted\n  file (ReadPCDImage func in pcd.c) (bsc#1036986).\n- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in\n  xwd.c) (bsc#1036987)\n- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in\n  sfw.c) (bsc#1036984)\n- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in\n  png.c) (bsc#1036985)\n- CVE-2017-8347: denial of service (memory leak) via a crafted file (ReadEXRImage func in\n  exr.c) (bsc#1036982)\n- CVE-2017-8348: denial of service (memory leak) via a crafted file (ReadMATImage func in\n  mat.c) (bsc#1036983)\n- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in\n  png.c) (bsc#1036980)\n- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in\n  dcm.c) (bsc#1036981)\n- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in\n  pict.c) (bsc#1036988)\n- CVE-2017-8354: denial of service (memory leak) via a crafted file (ReadBMPImage func in\n  bmp.c) (bsc#1036989)\n- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in\n  bmp.c:1379) (bsc#1038000)\n- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other\n  impact via a crafted image (bsc#1033091)\n- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in\n  coders\\icon.c) (bsc#1037527)\n- CVE-2017-8356: denial of service (memory leak) via a crafted file (ReadSUNImage function in\n  sun.c) (bsc#1036991)\n- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in\n  mtv.c) (bsc#1036990)\n- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in\n  pcx.c) (bsc#1036978)\n- CVE-2017-8343: denial of service (memory leak) via a crafted file (ReadAAIImage func in\n  aai.c) (bsc#1036977)\n- CVE-2017-8357: denial of service (memory leak) via a crafted file (ReadEPTImage func in\n  ept.c) (bsc#1036976)\n- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder \n  function coders/rle.c (bsc#1040025)\n- CVE-2017-9141: Missing checks in the ReadDDSImage function in\n  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)\n- CVE-2017-9142: Missing checks in theReadOneJNGImage function in\n  coders/png.c could lead to denial of service (assertion) (bsc#1040304)\n- CVE-2017-9143: A possible denial of service attack via crafted .art\n  file in ReadARTImage function in coders/art.c (bsc#1040306)\n- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c\n  could lead to a denial of service (crash) (bsc#1040332)\n","id":"SUSE-SU-2017:1489-1","modified":"2017-06-06T10:26:14Z","published":"2017-06-06T10:26:14Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20171489-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1028075"},{"type":"REPORT","url":"https://bugzilla.suse.com/1033091"},{"type":"REPORT","url":"https://bugzilla.suse.com/1034870"},{"type":"REPORT","url":"https://bugzilla.suse.com/1034872"},{"type":"REPORT","url":"https://bugzilla.suse.com/1034876"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036976"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036977"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036978"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036980"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036981"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036982"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036983"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036987"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036990"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036991"},{"type":"REPORT","url":"https://bugzilla.suse.com/1037527"},{"type":"REPORT","url":"https://bugzilla.suse.com/1038000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1040025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1040303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1040304"},{"type":"REPORT","url":"https://bugzilla.suse.com/1040306"},{"type":"REPORT","url":"https://bugzilla.suse.com/1040332"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-6502"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7606"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7941"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7942"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7943"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8343"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8344"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8345"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8346"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8347"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8348"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8349"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8351"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8352"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8353"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8354"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8355"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8356"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8357"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8765"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9143"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9144"}],"related":["CVE-2017-6502","CVE-2017-7606","CVE-2017-7941","CVE-2017-7942","CVE-2017-7943","CVE-2017-8343","CVE-2017-8344","CVE-2017-8345","CVE-2017-8346","CVE-2017-8347","CVE-2017-8348","CVE-2017-8349","CVE-2017-8350","CVE-2017-8351","CVE-2017-8352","CVE-2017-8353","CVE-2017-8354","CVE-2017-8355","CVE-2017-8356","CVE-2017-8357","CVE-2017-8765","CVE-2017-8830","CVE-2017-9098","CVE-2017-9141","CVE-2017-9142","CVE-2017-9143","CVE-2017-9144"],"summary":"Security update for ImageMagick","upstream":["CVE-2017-6502","CVE-2017-7606","CVE-2017-7941","CVE-2017-7942","CVE-2017-7943","CVE-2017-8343","CVE-2017-8344","CVE-2017-8345","CVE-2017-8346","CVE-2017-8347","CVE-2017-8348","CVE-2017-8349","CVE-2017-8350","CVE-2017-8351","CVE-2017-8352","CVE-2017-8353","CVE-2017-8354","CVE-2017-8355","CVE-2017-8356","CVE-2017-8357","CVE-2017-8765","CVE-2017-8830","CVE-2017-9098","CVE-2017-9141","CVE-2017-9142","CVE-2017-9143","CVE-2017-9144"]}