{"id":"SUSE-SU-2017:1599-1","summary":"Security update for ImageMagick","details":"\nThis update for ImageMagick fixes the following issues:\n\nThis security issue was fixed:\n\n- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an\n  amount of available memory via a crafted file (bsc#1034876).\n- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted\n  file (ReadPCDImage func in pcd.c) (bsc#1036986).\n- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in\n  xwd.c) (bsc#1036987)\n- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in\n  sfw.c) (bsc#1036984)\n- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in\n  png.c) (bsc#1036985)\n- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in\n  png.c) (bsc#1036980)\n- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in\n  dcm.c) (bsc#1036981)\n- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in\n  pict.c) (bsc#1036988)\n- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in\n  bmp.c:1379) (bsc#1038000)\n- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other\n  impact via a crafted image (bsc#1033091)\n- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in\n  coders\\icon.c) (bsc#1037527)\n- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in\n  mtv.c) (bsc#1036990)\n- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in\n  pcx.c) (bsc#1036978)\n- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder \n  function coders/rle.c (bsc#1040025)\n- CVE-2017-9141: Missing checks in the ReadDDSImage function in\n  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)\n- CVE-2017-9142: Missing checks in theReadOneJNGImage function in\n  coders/png.c could lead to denial of service (assertion) (bsc#1040304)\n- CVE-2017-9143: A possible denial of service attack via crafted .art\n  file in ReadARTImage function in coders/art.c (bsc#1040306)\n- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c\n  could lead to a denial of service (crash) (bsc#1040332)\n\n","modified":"2025-05-02T04:04:17.031053Z","published":"2017-06-19T06:54:23Z","related":["CVE-2014-9846","CVE-2016-10050","CVE-2017-7606","CVE-2017-7941","CVE-2017-7942","CVE-2017-7943","CVE-2017-8344","CVE-2017-8345","CVE-2017-8346","CVE-2017-8348","CVE-2017-8349","CVE-2017-8350","CVE-2017-8351","CVE-2017-8352","CVE-2017-8353","CVE-2017-8354","CVE-2017-8355","CVE-2017-8357","CVE-2017-8765","CVE-2017-8830","CVE-2017-9098","CVE-2017-9141","CVE-2017-9142","CVE-2017-9143","CVE-2017-9144"],"upstream":["CVE-2014-9846","CVE-2016-10050","CVE-2017-7606","CVE-2017-7941","CVE-2017-7942","CVE-2017-7943","CVE-2017-8344","CVE-2017-8345","CVE-2017-8346","CVE-2017-8348","CVE-2017-8349","CVE-2017-8350","CVE-2017-8351","CVE-2017-8352","CVE-2017-8353","CVE-2017-8354","CVE-2017-8355","CVE-2017-8357","CVE-2017-8765","CVE-2017-8830","CVE-2017-9098","CVE-2017-9141","CVE-2017-9142","CVE-2017-9143","CVE-2017-9144"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1033091"},{"type":"REPORT","url":"https://bugzilla.suse.com/1034870"},{"type":"REPORT","url":"https://bugzilla.suse.com/1034872"},{"type":"REPORT","url":"https://bugzilla.suse.com/1034876"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036976"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036978"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036980"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036981"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036983"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036987"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1036990"},{"type":"REPORT","url":"https://bugzilla.suse.com/1037527"},{"type":"REPORT","url":"https://bugzilla.suse.com/1038000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1040025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1040303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1040304"},{"type":"REPORT","url":"https://bugzilla.suse.com/1040306"},{"type":"REPORT","url":"https://bugzilla.suse.com/1040332"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9846"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10050"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7606"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7941"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7942"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7943"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8344"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8345"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8346"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8348"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8349"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8351"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8352"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8353"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8354"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8355"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8357"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8765"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9143"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9144"}],"affected":[{"package":{"name":"ImageMagick","ecosystem":"SUSE:Linux Enterprise Software Development Kit 11 SP4","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.4.3.6-7.77.1"}]}],"ecosystem_specific":{"binaries":[{"libMagickWand1":"6.4.3.6-7.77.1","libMagick++1":"6.4.3.6-7.77.1","ImageMagick":"6.4.3.6-7.77.1","ImageMagick-devel":"6.4.3.6-7.77.1","libMagick++-devel":"6.4.3.6-7.77.1","libMagickWand1-32bit":"6.4.3.6-7.77.1","perl-PerlMagick":"6.4.3.6-7.77.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:1599-1.json"}},{"package":{"name":"ImageMagick","ecosystem":"SUSE:Linux Enterprise Server 11 SP4","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.4.3.6-7.77.1"}]}],"ecosystem_specific":{"binaries":[{"libMagickCore1-32bit":"6.4.3.6-7.77.1","libMagickCore1":"6.4.3.6-7.77.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:1599-1.json"}},{"package":{"name":"ImageMagick","ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.4.3.6-7.77.1"}]}],"ecosystem_specific":{"binaries":[{"libMagickCore1-32bit":"6.4.3.6-7.77.1","libMagickCore1":"6.4.3.6-7.77.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:1599-1.json"}}],"schema_version":"1.7.3"}