<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for php7-imagick</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:0014-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-01-13T15:17:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-01-13T15:17:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-01-13T15:17:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for php7-imagick</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for php7-imagick fixes the following issues:

Upgrade to version 3.4.4:

Added:

  * function Imagick::optimizeImageTransparency()
  * METRIC_STRUCTURAL_SIMILARITY_ERROR
  * METRIC_STRUCTURAL_DISSIMILARITY_ERROR
  * COMPRESSION_ZSTD - https://github.com/facebook/zstd
  * COMPRESSION_WEBP
  * CHANNEL_COMPOSITE_MASK
  * FILTER_CUBIC_SPLINE - 'Define the lobes with the -define 
    filter:lobes={2,3,4}
    (reference https://imagemagick.org/discourse-server/viewtopic.php?f=2&amp;t=32506).'
  * Imagick now explicitly conflicts with the Gmagick extension.

Fixes:

  * Correct version check to make RemoveAlphaChannel and FlattenAlphaChannel 
    be available when using Imagick with ImageMagick version 6.7.8-x
  * Bug 77128 - Imagick::setImageInterpolateMethod() not available on Windows
  * Prevent memory leak when ImagickPixel::__construct called after object instantiation.
  * Prevent segfault when ImagickPixel internal constructor not called.
  * Imagick::setResourceLimit support for values larger than 2GB (2^31) on 32bit platforms.
  * Corrected memory overwrite in Imagick::colorDecisionListImage()
  * Bug 77791 - ImagickKernel::fromMatrix() out of bounds write.
    Fixes CVE-2019-11037, boo#1135418

The following functions have been deprecated:

  * ImagickDraw, matte
  * Imagick::averageimages
  * Imagick::colorfloodfillimage
  * Imagick::filter
  * Imagick::flattenimages
  * Imagick::getimageattribute
  * Imagick::getimagechannelextrema
  * Imagick::getimageclipmask
  * Imagick::getimageextrema
  * Imagick::getimageindex
  * Imagick::getimagematte
  * Imagick::getimagemattecolor
  * Imagick::getimagesize
  * Imagick::mapimage
  * Imagick::mattefloodfillimage
  * Imagick::medianfilterimage
  * Imagick::mosaicimages
  * Imagick::orderedposterizeimage
  * Imagick::paintfloodfillimage
  * Imagick::paintopaqueimage
  * Imagick::painttransparentimage
  * Imagick::radialblurimage
  * Imagick::recolorimage
  * Imagick::reducenoiseimage
  * Imagick::roundcornersimage
  * Imagick::roundcorners
  * Imagick::setimageattribute
  * Imagick::setimagebias
  * Imagick::setimageclipmask
  * Imagick::setimageindex
  * Imagick::setimagemattecolor
  * Imagick::setimagebiasquantum
  * Imagick::setimageopacity
  * Imagick::transformimage

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-14</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGV7VQ6VPH5S7V7PYMCMEEKUWPZOL27Y/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:0014-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1135418</URL>
      <Description>SUSE Bug 1135418</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11037/</URL>
      <Description>SUSE CVE CVE-2019-11037 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP1">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP1">
        <FullProductName ProductID="SUSE Package Hub 15 SP1">SUSE Package Hub 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="php7-imagick-3.4.4-bp151.2.3.1">
      <FullProductName ProductID="php7-imagick-3.4.4-bp151.2.3.1">php7-imagick-3.4.4-bp151.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="php7-imagick-3.4.4-bp151.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:php7-imagick-3.4.4-bp151.2.3.1">php7-imagick-3.4.4-bp151.2.3.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-imagick-3.4.4-bp151.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP1">
      <FullProductName ProductID="SUSE Package Hub 15 SP1:php7-imagick-3.4.4-bp151.2.3.1">php7-imagick-3.4.4-bp151.2.3.1 as a component of SUSE Package Hub 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="php7-imagick-3.4.4-bp151.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:php7-imagick-3.4.4-bp151.2.3.1">php7-imagick-3.4.4-bp151.2.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PHP imagick extension in versions between 3.3.0 and 3.4.4, writing to an array of values in ImagickKernel::fromMatrix() function did not check that the address will be within the allocated array. This could lead to out of bounds write to memory if the function is called with the data controlled by untrusted party.</Note>
    </Notes>
    <CVE>CVE-2019-11037</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:php7-imagick-3.4.4-bp151.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP1:php7-imagick-3.4.4-bp151.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:php7-imagick-3.4.4-bp151.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGV7VQ6VPH5S7V7PYMCMEEKUWPZOL27Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11037.html</URL>
        <Description>CVE-2019-11037</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135418</URL>
        <Description>SUSE Bug 1135418</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
