Bugzilla – Bug 1048110
VUL-1: CVE-2017-11166: ImageMagick: In ReadXWDImage in coders\xwd.c a memoryleak can cause memory exhaustion via a crafted length
Last modified: 2018-03-06 23:44:35 UTC
CVE-2017-11166 The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11166 https://github.com/ImageMagick/ImageMagick/issues/471
Created attachment 731883 [details] Reproducer
Seems to be similar to bug 1048272.
BEFORE 12/ImageMagick $ identify ImageMagick-7.0.5-6-memory-exhaustion.XWD 048110: memory allocation failed `ImageMagick-7.0.5-6-memory-exhaustion.XWD' @ error/xwd.c/ReadXWDImage/330. $ 11/ImageMagick $ identify ImageMagick-7.0.5-6-memory-exhaustion.XWD identify: Memory allocation failed `ImageMagick-7.0.5-6-memory-exhaustion.XWD'. $ 11/GraphicsMagick $ gm identify ImageMagick-7.0.5-6-memory-exhaustion.XWD gm identify: Memory allocation failed (ImageMagick-7.0.5-6-memory-exhaustion.XWD) [Cannot allocate memory]. $ 42.3/GraphicsMagick $ gm identify ImageMagick-7.0.5-6-memory-exhaustion.XWD ImageMagick-7.0.5-6-memory-exhaustion.XWD XWD 8x4+0+0 DirectClass 8-bit 197 0.000u 0m:0.000003s $ [no issues observed] PATCH 11/GraphicsMagick and 42.3/GraphicsMagick have already the code AFTER 12/ImageMagick $ valgrind -q identify ImageMagick-7.0.5-6-memory-exhaustion.XWD identify: memory allocation failed `ImageMagick-7.0.5-6-memory-exhaustion.XWD' @ error/xwd.c/ReadXWDImage/332. $ 11/ImageMagick $ valgrind -q identify ImageMagick-7.0.5-6-memory-exhaustion.XWD identify: Memory allocation failed `ImageMagick-7.0.5-6-memory-exhaustion.XWD'. $ [no change]
Will submit for: 12/ImageMagick and 11/ImageMagick
Packages submitted.
SUSE-SU-2018:0486-1: An update that fixes 24 vulnerabilities is now available. Category: security (moderate) Bug References: 1042824,1048110,1049374,1049375,1050048,1050617,1050669,1052207,1052248,1052251,1052254,1052472,1052688,1052711,1052747,1052750,1052761,1055069,1055229,1058009,1074119,1076182,1078433 CVE References: CVE-2017-11166,CVE-2017-11448,CVE-2017-11450,CVE-2017-11537,CVE-2017-11637,CVE-2017-11638,CVE-2017-11642,CVE-2017-12418,CVE-2017-12427,CVE-2017-12429,CVE-2017-12432,CVE-2017-12566,CVE-2017-12654,CVE-2017-12664,CVE-2017-12665,CVE-2017-12668,CVE-2017-12674,CVE-2017-13058,CVE-2017-13131,CVE-2017-14224,CVE-2017-17885,CVE-2017-18028,CVE-2017-9407,CVE-2018-6405 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): ImageMagick-6.4.3.6-7.78.34.1 SUSE Linux Enterprise Server 11-SP4 (src): ImageMagick-6.4.3.6-7.78.34.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): ImageMagick-6.4.3.6-7.78.34.1
SUSE-SU-2018:0581-1: An update that fixes 35 vulnerabilities is now available. Category: security (moderate) Bug References: 1042824,1042911,1048110,1048272,1049374,1049375,1050048,1050119,1050122,1050126,1050132,1050617,1052207,1052248,1052251,1052254,1052472,1052688,1052711,1052747,1052750,1052754,1052761,1055069,1055229,1056768,1057163,1058009,1072898,1074119,1074170,1075821,1076182,1078433 CVE References: CVE-2017-11166,CVE-2017-11170,CVE-2017-11448,CVE-2017-11450,CVE-2017-11528,CVE-2017-11530,CVE-2017-11531,CVE-2017-11533,CVE-2017-11537,CVE-2017-11638,CVE-2017-11642,CVE-2017-12418,CVE-2017-12427,CVE-2017-12429,CVE-2017-12432,CVE-2017-12566,CVE-2017-12654,CVE-2017-12663,CVE-2017-12664,CVE-2017-12665,CVE-2017-12668,CVE-2017-12674,CVE-2017-13058,CVE-2017-13131,CVE-2017-14060,CVE-2017-14139,CVE-2017-14224,CVE-2017-17682,CVE-2017-17885,CVE-2017-17934,CVE-2017-18028,CVE-2017-9405,CVE-2017-9407,CVE-2018-5357,CVE-2018-6405 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP3 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Workstation Extension 12-SP2 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Server 12-SP3 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Server 12-SP2 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Desktop 12-SP3 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Desktop 12-SP2 (src): ImageMagick-6.8.8.1-71.42.1
Releasing for Leap, showing as done otherwise
openSUSE-SU-2018:0621-1: An update that fixes 35 vulnerabilities is now available. Category: security (moderate) Bug References: 1042824,1042911,1048110,1048272,1049374,1049375,1050048,1050119,1050122,1050126,1050132,1050617,1052207,1052248,1052251,1052254,1052472,1052688,1052711,1052747,1052750,1052754,1052761,1055069,1055229,1056768,1057163,1058009,1072898,1074119,1074170,1075821,1076182,1078433 CVE References: CVE-2017-11166,CVE-2017-11170,CVE-2017-11448,CVE-2017-11450,CVE-2017-11528,CVE-2017-11530,CVE-2017-11531,CVE-2017-11533,CVE-2017-11537,CVE-2017-11638,CVE-2017-11642,CVE-2017-12418,CVE-2017-12427,CVE-2017-12429,CVE-2017-12432,CVE-2017-12566,CVE-2017-12654,CVE-2017-12663,CVE-2017-12664,CVE-2017-12665,CVE-2017-12668,CVE-2017-12674,CVE-2017-13058,CVE-2017-13131,CVE-2017-14060,CVE-2017-14139,CVE-2017-14224,CVE-2017-17682,CVE-2017-17885,CVE-2017-17934,CVE-2017-18028,CVE-2017-9405,CVE-2017-9407,CVE-2018-5357,CVE-2018-6405 Sources used: openSUSE Leap 42.3 (src): ImageMagick-6.8.8.1-55.1