USN-6200-2: ImageMagick vulnerabilities
25 July 2024
Several security issues were fixed in ImageMagick.
Releases
Packages
- imagemagick - Image manipulation programs and library
Details
USN-6200-1 fixed vulnerabilities in ImageMagick. Unfortunately these fixes were
incomplete for Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. This update fixes the
problem.
Original advisory details:
It was discovered that ImageMagick incorrectly handled the "-authenticate"
option for password-protected PDF files. An attacker could possibly use
this issue to inject additional shell commands and perform arbitrary code
execution. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-29599)
It was discovered that ImageMagick incorrectly handled certain values
when processing PDF files. If a user or automated system using ImageMagick
were tricked into opening a specially crafted PDF file, an attacker could
exploit this to cause a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-20224)
Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
values when processing image data. If a user or automated system using
ImageMagick were tricked into opening a specially crafted image, an
attacker could exploit this to cause a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-20241, CVE-2021-20243)
It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-20244, CVE-2021-20309)
It was discovered that ImageMagick incorrectly handled certain values
when performing resampling operations. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-20246)
It was discovered that ImageMagick incorrectly handled certain values
when processing thumbnail image data. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-20312)
It was discovered that ImageMagick incorrectly handled memory cleanup
when performing certain cryptographic operations. Under certain conditions
sensitive cryptographic information could be disclosed. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-20313)
It was discovered that ImageMagick did not use the correct rights when
specifically excluded by a module policy. An attacker could use this issue
to read and write certain restricted files. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-39212)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
20.04 LTS. (CVE-2022-28463, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2021-3610, CVE-2023-1906,
CVE-2023-3428)
It was discovered that ImageMagick incorrectly handled certain values
when processing specially crafted SVG files. By tricking a user into
opening a specially crafted SVG file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-1289)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
tiff file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-3195)
It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. (CVE-2023-34151)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
imagemagick
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
imagemagick-6-common
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
imagemagick-6.q16
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
imagemagick-6.q16hdri
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
imagemagick-common
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libimage-magick-perl
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libimage-magick-q16-perl
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libimage-magick-q16hdri-perl
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagick++-6-headers
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagick++-6.q16-8
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagick++-6.q16-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagick++-6.q16hdri-8
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagick++-6.q16hdri-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagick++-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickcore-6-headers
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickcore-6.q16-6
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickcore-6.q16-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickcore-6.q16hdri-6
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickcore-6.q16hdri-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickcore-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickwand-6-headers
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickwand-6.q16-6
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickwand-6.q16-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickwand-6.q16hdri-6
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickwand-6.q16hdri-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
libmagickwand-dev
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
-
perlmagick
-
8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5
Ubuntu 20.04
-
imagemagick
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
imagemagick-6-common
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
imagemagick-6.q16
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
imagemagick-6.q16hdri
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
imagemagick-common
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libimage-magick-perl
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libimage-magick-q16-perl
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libimage-magick-q16hdri-perl
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagick++-6-headers
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagick++-6.q16-8
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagick++-6.q16-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagick++-6.q16hdri-8
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagick++-6.q16hdri-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagick++-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickcore-6-headers
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickcore-6.q16-6
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickcore-6.q16-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickcore-6.q16hdri-6
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickcore-6.q16hdri-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickcore-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickwand-6-headers
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickwand-6.q16-6
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickwand-6.q16-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickwand-6.q16hdri-6
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickwand-6.q16hdri-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
libmagickwand-dev
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
-
perlmagick
-
8:6.9.10.23+dfsg-2.1ubuntu11.10
In general, a standard system update will make all the necessary changes.