[USN-7068-1] ImageMagick vulnerabilities

Chrisa Oikonomou chrisa.oikonomou at canonical.com
Tue Oct 15 09:56:36 UTC 2024


==========================================================================

Ubuntu Security Notice USN-7068-1
October 15, 2024

imagemagick vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in ImageMagick.

Software Description:
- imagemagick: Image manipulation programs and library

Details:

It was discovered that ImageMagick incorrectly handled certain
malformed image files. If a user or automated system using ImageMagick
were tricked into processing a specially crafted file, an attacker could
exploit this to cause a denial of service or affect the reliability of the
system. The vulnerabilities included memory leaks, buffer overflows, and
improper handling of pixel data.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS
   imagemagick-6.q16               8:6.8.9.9-7ubuntu5.16+esm11
                                   Available with Ubuntu Pro
   libimage-magick-perl            8:6.8.9.9-7ubuntu5.16+esm11
                                   Available with Ubuntu Pro
   libimage-magick-q16-perl        8:6.8.9.9-7ubuntu5.16+esm11
                                   Available with Ubuntu Pro
   libmagick++-6.q16-5v5           8:6.8.9.9-7ubuntu5.16+esm11
                                   Available with Ubuntu Pro
   libmagickcore-6-headers         8:6.8.9.9-7ubuntu5.16+esm11
                                   Available with Ubuntu Pro
   libmagickcore-6.q16-2           8:6.8.9.9-7ubuntu5.16+esm11
                                   Available with Ubuntu Pro
   libmagickcore-6.q16-2-extra     8:6.8.9.9-7ubuntu5.16+esm11
                                   Available with Ubuntu Pro
   libmagickcore-6.q16-dev         8:6.8.9.9-7ubuntu5.16+esm11
                                   Available with Ubuntu Pro
   libmagickwand-6.q16-2           8:6.8.9.9-7ubuntu5.16+esm11
                                   Available with Ubuntu Pro

Ubuntu 14.04 LTS
   imagemagick                     8:6.7.7.10-6ubuntu3.13+esm11
                                   Available with Ubuntu Pro
   libmagick++-dev                 8:6.7.7.10-6ubuntu3.13+esm11
                                   Available with Ubuntu Pro
   libmagick++5                    8:6.7.7.10-6ubuntu3.13+esm11
                                   Available with Ubuntu Pro
   libmagickcore-dev               8:6.7.7.10-6ubuntu3.13+esm11
                                   Available with Ubuntu Pro
   libmagickcore5                  8:6.7.7.10-6ubuntu3.13+esm11
                                   Available with Ubuntu Pro
   libmagickcore5-extra            8:6.7.7.10-6ubuntu3.13+esm11
                                   Available with Ubuntu Pro
   libmagickwand-dev               8:6.7.7.10-6ubuntu3.13+esm11
                                   Available with Ubuntu Pro
   libmagickwand5                  8:6.7.7.10-6ubuntu3.13+esm11
                                   Available with Ubuntu Pro
   perlmagick                      8:6.7.7.10-6ubuntu3.13+esm11
                                   Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7068-1 
<https://ubuntu.com/security/notices/USN-7068-1>
   CVE-2019-7397, CVE-2019-7398, CVE-2019-9956, CVE-2020-19667,
   CVE-2020-25664, CVE-2020-25665, CVE-2020-25666, CVE-2020-25674,
   CVE-2020-25676, CVE-2020-27560, CVE-2020-27750, CVE-2020-27753,
   CVE-2020-27754, CVE-2020-27755, CVE-2020-27758, CVE-2020-27759,
   CVE-2020-27760, CVE-2020-27761, CVE-2020-27762, CVE-2020-27763,
   CVE-2020-27764, CVE-2020-27765, CVE-2020-27766, CVE-2020-27767,
   CVE-2020-27768, CVE-2020-27769, CVE-2020-27770, CVE-2020-27771,
   CVE-2020-27772, CVE-2020-27773, CVE-2020-27774, CVE-2020-27775,
   CVE-2020-27776

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20241015/823bde00/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 665 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20241015/823bde00/attachment-0001.sig>


More information about the ubuntu-security-announce mailing list