SUSE-SU-2017:2229-1: important: Security update for GraphicsMagick

SUSE Security Update: Security update for GraphicsMagick

Announcement ID: SUSE-SU-2017:2229-1
Rating: important
References: #1036985 #1042826 #1043289 #1049072 #1050611
Cross-References: CVE-2017-11403 CVE-2017-11636 CVE-2017-11643
CVE-2017-8350 CVE-2017-9439 CVE-2017-9501

Affected Products:
SUSE Studio Onsite 1.3
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4

An update that fixes 6 vulnerabilities is now available.


This update for GraphicsMagick fixes the following issues:

Security issues fixed:

– CVE-2017-8350: The PNG/JNG decoder recieved an incremental fix, fixing
some related issues in the same code. (bsc#1036985)
– CVE-2017-9439: A memory leak was found in the function ReadPDBImage
incoders/pdb.c (bsc#1042826)
– CVE-2017-9501: An assertion failure could cause a denial of service via
a crafted file (bsc#1043289)
– CVE-2017-11403: The ReadMNGImage function in coders/png.c has an
out-of-order CloseBlob call, resulting in a use-after-free via a crafted
file (bsc#1049072)
– CVE-2017-11643: A heap overflow in WriteCMYKImage()function in
coders/cmyk.c was fixed (bsc#1050611)
– CVE-2017-11636: A heap overflow in WriteRGBImage() in coders/rgb.c was
fixed (bsc#1050674)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Studio Onsite 1.3:

zypper in -t patch slestso13-GraphicsMagick-13236=1

– SUSE Linux Enterprise Software Development Kit 11-SP4:

zypper in -t patch sdksp4-GraphicsMagick-13236=1

– SUSE Linux Enterprise Debuginfo 11-SP4:

zypper in -t patch dbgsp4-GraphicsMagick-13236=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Studio Onsite 1.3 (x86_64):


– SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):


– SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):



To unsubscribe, e-mail:
For additional commands, e-mail: