SUSE update for ImageMagick



Published: 2022-07-11
Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2022-32545
CVE-2022-32546
CVE-2022-32547
CWE-ID CWE-190
CWE-704
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise Module for Development Tools
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Desktop Applications
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop
Operating systems & Components / Operating system

SUSE Linux Enterprise Server
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing
Operating systems & Components / Operating system

ImageMagick-doc
Operating systems & Components / Operating system package or component

libMagickWand-7_Q16HDRI10-32bit-debuginfo
Operating systems & Components / Operating system package or component

libMagickWand-7_Q16HDRI10-32bit
Operating systems & Components / Operating system package or component

libMagickCore-7_Q16HDRI10-32bit-debuginfo
Operating systems & Components / Operating system package or component

libMagickCore-7_Q16HDRI10-32bit
Operating systems & Components / Operating system package or component

libMagick++-devel-32bit
Operating systems & Components / Operating system package or component

libMagick++-7_Q16HDRI5-32bit-debuginfo
Operating systems & Components / Operating system package or component

libMagick++-7_Q16HDRI5-32bit
Operating systems & Components / Operating system package or component

ImageMagick-devel-32bit
Operating systems & Components / Operating system package or component

perl-PerlMagick-debuginfo
Operating systems & Components / Operating system package or component

perl-PerlMagick
Operating systems & Components / Operating system package or component

libMagickWand-7_Q16HDRI10-debuginfo
Operating systems & Components / Operating system package or component

libMagickWand-7_Q16HDRI10
Operating systems & Components / Operating system package or component

libMagickCore-7_Q16HDRI10-debuginfo
Operating systems & Components / Operating system package or component

libMagickCore-7_Q16HDRI10
Operating systems & Components / Operating system package or component

libMagick++-devel
Operating systems & Components / Operating system package or component

libMagick++-7_Q16HDRI5-debuginfo
Operating systems & Components / Operating system package or component

libMagick++-7_Q16HDRI5
Operating systems & Components / Operating system package or component

ImageMagick-extra-debuginfo
Operating systems & Components / Operating system package or component

ImageMagick-extra
Operating systems & Components / Operating system package or component

ImageMagick-devel
Operating systems & Components / Operating system package or component

ImageMagick-debugsource
Operating systems & Components / Operating system package or component

ImageMagick-debuginfo
Operating systems & Components / Operating system package or component

ImageMagick-config-7-upstream
Operating systems & Components / Operating system package or component

ImageMagick-config-7-SUSE
Operating systems & Components / Operating system package or component

ImageMagick
Operating systems & Components / Operating system package or component

Vendor SuSE

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Integer overflow

EUVDB-ID: #VU64947

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-32545

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack. 

The vulnerability exists due to integer overflow in coders/psd.c in the ImageMagick when processing crafted or untrusted input. A remote attacker can trick the victim into opening a specially crafted file and perform a denial of service attack. 

Mitigation

Update the affected package ImageMagick to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Development Tools: 15-SP4

SUSE Linux Enterprise Module for Desktop Applications: 15-SP4

SUSE Linux Enterprise Desktop: 15-SP4

SUSE Linux Enterprise Server: 15-SP4

openSUSE Leap: 15.4

SUSE Linux Enterprise Server for SAP Applications: 15-SP4

SUSE Linux Enterprise High Performance Computing: 15-SP4

ImageMagick-doc: before 7.1.0.9-150400.6.3.1

libMagickWand-7_Q16HDRI10-32bit-debuginfo: before 7.1.0.9-150400.6.3.1

libMagickWand-7_Q16HDRI10-32bit: before 7.1.0.9-150400.6.3.1

libMagickCore-7_Q16HDRI10-32bit-debuginfo: before 7.1.0.9-150400.6.3.1

libMagickCore-7_Q16HDRI10-32bit: before 7.1.0.9-150400.6.3.1

libMagick++-devel-32bit: before 7.1.0.9-150400.6.3.1

libMagick++-7_Q16HDRI5-32bit-debuginfo: before 7.1.0.9-150400.6.3.1

libMagick++-7_Q16HDRI5-32bit: before 7.1.0.9-150400.6.3.1

ImageMagick-devel-32bit: before 7.1.0.9-150400.6.3.1

perl-PerlMagick-debuginfo: before 7.1.0.9-150400.6.3.1

perl-PerlMagick: before 7.1.0.9-150400.6.3.1

libMagickWand-7_Q16HDRI10-debuginfo: before 7.1.0.9-150400.6.3.1

libMagickWand-7_Q16HDRI10: before 7.1.0.9-150400.6.3.1

libMagickCore-7_Q16HDRI10-debuginfo: before 7.1.0.9-150400.6.3.1

libMagickCore-7_Q16HDRI10: before 7.1.0.9-150400.6.3.1

libMagick++-devel: before 7.1.0.9-150400.6.3.1

libMagick++-7_Q16HDRI5-debuginfo: before 7.1.0.9-150400.6.3.1

libMagick++-7_Q16HDRI5: before 7.1.0.9-150400.6.3.1

ImageMagick-extra-debuginfo: before 7.1.0.9-150400.6.3.1

ImageMagick-extra: before 7.1.0.9-150400.6.3.1

ImageMagick-devel: before 7.1.0.9-150400.6.3.1

ImageMagick-debugsource: before 7.1.0.9-150400.6.3.1

ImageMagick-debuginfo: before 7.1.0.9-150400.6.3.1

ImageMagick-config-7-upstream: before 7.1.0.9-150400.6.3.1

ImageMagick-config-7-SUSE: before 7.1.0.9-150400.6.3.1

ImageMagick: before 7.1.0.9-150400.6.3.1


CPE2.3 External links

http://www.suse.com/support/update/announcement/2022/suse-su-20222301-1/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Integer overflow

EUVDB-ID: #VU64948

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-32546

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to integer overflow in coders/pcl.c in the ImageMagick when processing crafted or untrusted input. A remote attacker can trick the victim into opening a specially crafted file and perform a denial of service attack.

Mitigation

Update the affected package ImageMagick to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Development Tools: 15-SP4

SUSE Linux Enterprise Module for Desktop Applications: 15-SP4

SUSE Linux Enterprise Desktop: 15-SP4

SUSE Linux Enterprise Server: 15-SP4

openSUSE Leap: 15.4

SUSE Linux Enterprise Server for SAP Applications: 15-SP4

SUSE Linux Enterprise High Performance Computing: 15-SP4

ImageMagick-doc: before 7.1.0.9-150400.6.3.1

libMagickWand-7_Q16HDRI10-32bit-debuginfo: before 7.1.0.9-150400.6.3.1

libMagickWand-7_Q16HDRI10-32bit: before 7.1.0.9-150400.6.3.1

libMagickCore-7_Q16HDRI10-32bit-debuginfo: before 7.1.0.9-150400.6.3.1

libMagickCore-7_Q16HDRI10-32bit: before 7.1.0.9-150400.6.3.1

libMagick++-devel-32bit: before 7.1.0.9-150400.6.3.1

libMagick++-7_Q16HDRI5-32bit-debuginfo: before 7.1.0.9-150400.6.3.1

libMagick++-7_Q16HDRI5-32bit: before 7.1.0.9-150400.6.3.1

ImageMagick-devel-32bit: before 7.1.0.9-150400.6.3.1

perl-PerlMagick-debuginfo: before 7.1.0.9-150400.6.3.1

perl-PerlMagick: before 7.1.0.9-150400.6.3.1

libMagickWand-7_Q16HDRI10-debuginfo: before 7.1.0.9-150400.6.3.1

libMagickWand-7_Q16HDRI10: before 7.1.0.9-150400.6.3.1

libMagickCore-7_Q16HDRI10-debuginfo: before 7.1.0.9-150400.6.3.1

libMagickCore-7_Q16HDRI10: before 7.1.0.9-150400.6.3.1

libMagick++-devel: before 7.1.0.9-150400.6.3.1

libMagick++-7_Q16HDRI5-debuginfo: before 7.1.0.9-150400.6.3.1

libMagick++-7_Q16HDRI5: before 7.1.0.9-150400.6.3.1

ImageMagick-extra-debuginfo: before 7.1.0.9-150400.6.3.1

ImageMagick-extra: before 7.1.0.9-150400.6.3.1

ImageMagick-devel: before 7.1.0.9-150400.6.3.1

ImageMagick-debugsource: before 7.1.0.9-150400.6.3.1

ImageMagick-debuginfo: before 7.1.0.9-150400.6.3.1

ImageMagick-config-7-upstream: before 7.1.0.9-150400.6.3.1

ImageMagick-config-7-SUSE: before 7.1.0.9-150400.6.3.1

ImageMagick: before 7.1.0.9-150400.6.3.1


CPE2.3 External links

http://www.suse.com/support/update/announcement/2022/suse-su-20222301-1/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Type conversion

EUVDB-ID: #VU64949

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-32547

CWE-ID: CWE-704 - Incorrect Type Conversion or Cast (Type Conversion)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to a load of misaligned address for type 'double' in MagickCore/property.c. A remote attacker can trick the victim into opening a specially crafted file and perform a denial of service attack.

Mitigation

Update the affected package ImageMagick to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Development Tools: 15-SP4

SUSE Linux Enterprise Module for Desktop Applications: 15-SP4

SUSE Linux Enterprise Desktop: 15-SP4

SUSE Linux Enterprise Server: 15-SP4

openSUSE Leap: 15.4

SUSE Linux Enterprise Server for SAP Applications: 15-SP4

SUSE Linux Enterprise High Performance Computing: 15-SP4

ImageMagick-doc: before 7.1.0.9-150400.6.3.1

libMagickWand-7_Q16HDRI10-32bit-debuginfo: before 7.1.0.9-150400.6.3.1

libMagickWand-7_Q16HDRI10-32bit: before 7.1.0.9-150400.6.3.1

libMagickCore-7_Q16HDRI10-32bit-debuginfo: before 7.1.0.9-150400.6.3.1

libMagickCore-7_Q16HDRI10-32bit: before 7.1.0.9-150400.6.3.1

libMagick++-devel-32bit: before 7.1.0.9-150400.6.3.1

libMagick++-7_Q16HDRI5-32bit-debuginfo: before 7.1.0.9-150400.6.3.1

libMagick++-7_Q16HDRI5-32bit: before 7.1.0.9-150400.6.3.1

ImageMagick-devel-32bit: before 7.1.0.9-150400.6.3.1

perl-PerlMagick-debuginfo: before 7.1.0.9-150400.6.3.1

perl-PerlMagick: before 7.1.0.9-150400.6.3.1

libMagickWand-7_Q16HDRI10-debuginfo: before 7.1.0.9-150400.6.3.1

libMagickWand-7_Q16HDRI10: before 7.1.0.9-150400.6.3.1

libMagickCore-7_Q16HDRI10-debuginfo: before 7.1.0.9-150400.6.3.1

libMagickCore-7_Q16HDRI10: before 7.1.0.9-150400.6.3.1

libMagick++-devel: before 7.1.0.9-150400.6.3.1

libMagick++-7_Q16HDRI5-debuginfo: before 7.1.0.9-150400.6.3.1

libMagick++-7_Q16HDRI5: before 7.1.0.9-150400.6.3.1

ImageMagick-extra-debuginfo: before 7.1.0.9-150400.6.3.1

ImageMagick-extra: before 7.1.0.9-150400.6.3.1

ImageMagick-devel: before 7.1.0.9-150400.6.3.1

ImageMagick-debugsource: before 7.1.0.9-150400.6.3.1

ImageMagick-debuginfo: before 7.1.0.9-150400.6.3.1

ImageMagick-config-7-upstream: before 7.1.0.9-150400.6.3.1

ImageMagick-config-7-SUSE: before 7.1.0.9-150400.6.3.1

ImageMagick: before 7.1.0.9-150400.6.3.1


CPE2.3 External links

http://www.suse.com/support/update/announcement/2022/suse-su-20222301-1/

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###