USN-6200-2: ImageMagick vulnerabilities
25 July 2024
Several security issues were fixed in ImageMagick.
Releases
Packages
- imagemagick - Image manipulation programs and library
Details
USN-6200-1 fixed vulnerabilities in ImageMagick. Unfortunately these fixes were
incomplete for Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. This update fixes the
problem.
Original advisory details:
It was discovered that ImageMagick incorrectly handled the "-authenticate"
option for password-protected PDF files. An attacker could possibly use
this issue to inject additional shell commands and perform arbitrary code
execution. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-29599)
It was discovered that ImageMagick incorrectly handled certain values
when processing PDF files. If a user or automated system using ImageMagick
were tricked into opening a specially crafted PDF file, an attacker could
exploit this to cause a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-20224)
Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
values when processing image data. If a user or automated system using
ImageMagick were tricked into opening a specially crafted image, an
attacker could exploit this to cause a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-20241, CVE-2021-20243)
It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-20244, CVE-2021-20309)
It was discovered that ImageMagick incorrectly handled certain values
when performing resampling operations. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-20246)
It was discovered that ImageMagick incorrectly handled certain values
when processing thumbnail image data. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-20312)
It was discovered that ImageMagick incorrectly handled memory cleanup
when performing certain cryptographic operations. Under certain conditions
sensitive cryptographic information could be disclosed. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-20313)
It was discovered that ImageMagick did not use the correct rights when
specifically excluded by a module policy. An attacker could use this issue
to read and write certain restricted files. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-39212)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
20.04 LTS. (CVE-2022-28463, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2021-3610, CVE-2023-1906,
CVE-2023-3428)
It was discovered that ImageMagick incorrectly handled certain values
when processing specially crafted SVG files. By tricking a user into
opening a specially crafted SVG file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-1289)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
tiff file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-3195)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. (CVE-2023-34151)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
imagemagick
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
imagemagick-6-common
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
imagemagick-6.q16
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
imagemagick-6.q16hdri
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
imagemagick-common
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libimage-magick-perl
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libimage-magick-q16-perl
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libimage-magick-q16hdri-perl
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagick++-6-headers
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagick++-6.q16-8
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagick++-6.q16-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagick++-6.q16hdri-8
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagick++-6.q16hdri-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagick++-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickcore-6-headers
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickcore-6.q16-6
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickcore-6.q16-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickcore-6.q16hdri-6
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickcore-6.q16hdri-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickcore-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickwand-6-headers
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickwand-6.q16-6
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickwand-6.q16-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickwand-6.q16hdri-6
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickwand-6.q16hdri-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickwand-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
perlmagick
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
Ubuntu 20.04
-
imagemagick
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
imagemagick-6-common
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
imagemagick-6.q16
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
imagemagick-6.q16hdri
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
imagemagick-common
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libimage-magick-perl
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libimage-magick-q16-perl
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libimage-magick-q16hdri-perl
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagick++-6-headers
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagick++-6.q16-8
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagick++-6.q16-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagick++-6.q16hdri-8
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagick++-6.q16hdri-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagick++-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickcore-6-headers
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickcore-6.q16-6
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickcore-6.q16-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickcore-6.q16hdri-6
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickcore-6.q16hdri-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickcore-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickwand-6-headers
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickwand-6.q16-6
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickwand-6.q16-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickwand-6.q16hdri-6
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickwand-6.q16hdri-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickwand-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
perlmagick
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6200-1: imagemagick, libmagick++-6.q16hdri-8, libmagickwand-6.q16hdri-dev, libmagickcore-6.q16hdri-3-extra, libmagickcore-6.q16hdri-6, imagemagick-6-common, libmagickcore-6.q16-3, libimage-magick-perl, libmagick++-6.q16-7, libmagickcore-6.q16-2, perlmagick, libmagickcore-6-arch-config, libmagickwand-dev, imagemagick-common, libmagickwand-6.q16-dev, imagemagick-6-doc, libmagickwand-6.q16-3, libmagickwand-6.q16hdri-6, imagemagick-doc, libmagickcore-6.q16-6-extra, libmagick++-6.q16-5v5, libmagickcore-6-headers, libmagickcore-6.q16-6, libmagickcore-6.q16hdri-3, libmagickcore-6.q16-3-extra, imagemagick-6.q16hdri, libmagick++-6.q16hdri-dev, libmagick++-dev, libmagickcore-dev, libmagickcore-6.q16-2-extra, libmagick++-6.q16-8, libmagickcore-6.q16hdri-dev, libimage-magick-q16-perl, libmagickwand-6-headers, libmagick++-6-headers, libmagickwand-6.q16-6, imagemagick-6.q16, libmagick++-6.q16-dev, libmagickcore-6.q16hdri-6-extra, libmagickwand-6.q16hdri-3, libimage-magick-q16hdri-perl, libmagick++-6.q16hdri-7, libmagickwand-6.q16-2, libmagickcore-6.q16-dev