[USN-6200-2] ImageMagick vulnerabilities

Paulo Flabiano Smorigo pfsmorigo at canonical.com
Mon Aug 5 17:18:25 UTC 2024


==========================================================================
Ubuntu Security Notice USN-6200-2
July 25, 2024

imagemagick vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in ImageMagick.

Software Description:
- imagemagick: Image manipulation programs and library

Details:

USN-6200-1 fixed vulnerabilities in ImageMagick. Unfortunately these fixes were
incomplete for Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. This update fixes the
problem.

Original advisory details:

 It was discovered that ImageMagick incorrectly handled the "-authenticate"
 option for password-protected PDF files. An attacker could possibly use
 this issue to inject additional shell commands and perform arbitrary code
 execution. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-29599)
 
 It was discovered that ImageMagick incorrectly handled certain values
 when processing PDF files. If a user or automated system using ImageMagick
 were tricked into opening a specially crafted PDF file, an attacker could
 exploit this to cause a denial of service. This issue only affected Ubuntu
 20.04 LTS. (CVE-2021-20224)
 
 Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
 values when processing image data. If a user or automated system using
 ImageMagick were tricked into opening a specially crafted image, an
 attacker could exploit this to cause a denial of service. This issue only
 affected Ubuntu 20.04 LTS. (CVE-2021-20241, CVE-2021-20243)
 
 It was discovered that ImageMagick incorrectly handled certain values
 when processing visual effects based image files. By tricking a user into
 opening a specially crafted image file, an attacker could crash the
 application causing a denial of service. This issue only affected Ubuntu
 20.04 LTS. (CVE-2021-20244, CVE-2021-20309)
 
 It was discovered that ImageMagick incorrectly handled certain values
 when performing resampling operations. By tricking a user into opening
 a specially crafted image file, an attacker could crash the application
 causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
 (CVE-2021-20246)
 
 It was discovered that ImageMagick incorrectly handled certain values
 when processing thumbnail image data. By tricking a user into opening
 a specially crafted image file, an attacker could crash the application
 causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
 (CVE-2021-20312)
 
 It was discovered that ImageMagick incorrectly handled memory cleanup
 when performing certain cryptographic operations. Under certain conditions
 sensitive cryptographic information could be disclosed. This issue only
 affected Ubuntu 20.04 LTS. (CVE-2021-20313)
 
 It was discovered that ImageMagick did not use the correct rights when
 specifically excluded by a module policy. An attacker could use this issue
 to read and write certain restricted files. This issue only affected Ubuntu
 20.04 LTS. (CVE-2021-39212)
 
 It was discovered that ImageMagick incorrectly handled memory under certain
 circumstances. If a user were tricked into opening a specially crafted
 image file, an attacker could possibly exploit this issue to cause a denial
 of service or other unspecified impact. This issue only affected Ubuntu
 20.04 LTS. (CVE-2022-28463, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547)
 
 It was discovered that ImageMagick incorrectly handled memory under certain
 circumstances. If a user were tricked into opening a specially crafted
 image file, an attacker could possibly exploit this issue to cause a denial
 of service or other unspecified impact. This issue only affected Ubuntu
 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2021-3610, CVE-2023-1906,
 CVE-2023-3428)
 
 It was discovered that ImageMagick incorrectly handled certain values
 when processing specially crafted SVG files. By tricking a user into
 opening a specially crafted SVG file, an attacker could crash the
 application causing a denial of service. This issue only affected Ubuntu
 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-1289)
 
 It was discovered that ImageMagick incorrectly handled memory under certain
 circumstances. If a user were tricked into opening a specially crafted
 tiff file, an attacker could possibly exploit this issue to cause a denial
 of service or other unspecified impact. This issue only affected Ubuntu
 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-3195)
 
 It was discovered that ImageMagick incorrectly handled memory under certain
 circumstances. If a user were tricked into opening a specially crafted
 image file, an attacker could possibly exploit this issue to cause a denial
 of service or other unspecified impact. (CVE-2023-34151)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
  imagemagick                     8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  imagemagick-6-common            8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  imagemagick-6.q16               8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  imagemagick-6.q16hdri           8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  imagemagick-common              8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libimage-magick-perl            8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libimage-magick-q16-perl        8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libimage-magick-q16hdri-perl    8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagick++-6-headers           8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagick++-6.q16-8             8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagick++-6.q16-dev           8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagick++-6.q16hdri-8         8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagick++-6.q16hdri-dev       8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagick++-dev                 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagickcore-6-headers         8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagickcore-6.q16-6           8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagickcore-6.q16-dev         8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagickcore-6.q16hdri-6       8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagickcore-6.q16hdri-dev     8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagickcore-dev               8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagickwand-6-headers         8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagickwand-6.q16-6           8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagickwand-6.q16-dev         8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagickwand-6.q16hdri-6       8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagickwand-6.q16hdri-dev     8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  libmagickwand-dev               8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  perlmagick                      8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5

Ubuntu 20.04 LTS
  imagemagick                     8:6.9.10.23+dfsg-2.1ubuntu11.10
  imagemagick-6-common            8:6.9.10.23+dfsg-2.1ubuntu11.10
  imagemagick-6.q16               8:6.9.10.23+dfsg-2.1ubuntu11.10
  imagemagick-6.q16hdri           8:6.9.10.23+dfsg-2.1ubuntu11.10
  imagemagick-common              8:6.9.10.23+dfsg-2.1ubuntu11.10
  libimage-magick-perl            8:6.9.10.23+dfsg-2.1ubuntu11.10
  libimage-magick-q16-perl        8:6.9.10.23+dfsg-2.1ubuntu11.10
  libimage-magick-q16hdri-perl    8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagick++-6-headers           8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagick++-6.q16-8             8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagick++-6.q16-dev           8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagick++-6.q16hdri-8         8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagick++-6.q16hdri-dev       8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagick++-dev                 8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagickcore-6-headers         8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagickcore-6.q16-6           8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagickcore-6.q16-dev         8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagickcore-6.q16hdri-6       8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagickcore-6.q16hdri-dev     8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagickcore-dev               8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagickwand-6-headers         8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagickwand-6.q16-6           8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagickwand-6.q16-dev         8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagickwand-6.q16hdri-6       8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagickwand-6.q16hdri-dev     8:6.9.10.23+dfsg-2.1ubuntu11.10
  libmagickwand-dev               8:6.9.10.23+dfsg-2.1ubuntu11.10
  perlmagick                      8:6.9.10.23+dfsg-2.1ubuntu11.10

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6200-2
  https://ubuntu.com/security/notices/USN-6200-1
  CVE-2023-1289, CVE-2023-34151

Package Information:
  https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
  https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.10.23+dfsg-2.1ubuntu11.10
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20240805/ff23df01/attachment.sig>


More information about the ubuntu-security-announce mailing list