Ubuntu 6494 Published by

An ImageMagick security update has been released for Ubuntu Linux 14.04 ESM, 16.04 ESM, 18.04 LTS, and 22.10.



USN-5736-1: ImageMagick vulnerabilities


==========================================================================
Ubuntu Security Notice USN-5736-1
November 24, 2022

imagemagick vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in ImageMagick.

Software Description:
- imagemagick: Image manipulation programs and library

Details:

It was discovered that ImageMagick incorrectly handled certain values
when processing PDF files. If a user or automated system using ImageMagick
were tricked into opening a specially crafted PDF file, an attacker could
exploit this to cause a denial of service. This issue only affected Ubuntu
14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. (CVE-2021-20224)

Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
values when processing image data. If a user or automated system using
ImageMagick were tricked into opening a specially crafted image, an
attacker could exploit this to cause a denial of service. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2021-20241)

Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
values when processing image data. If a user or automated system using
ImageMagick were tricked into opening a specially crafted image, an
attacker could exploit this to cause a denial of service. This issue only
affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10.
(CVE-2021-20243)

It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
22.10. (CVE-2021-20244)

It was discovered that ImageMagick could be made to divide by zero when
processing crafted file. By tricking a user into opening a specially
crafted image file, an attacker could crash the application causing a
denial of service. This issue only affected Ubuntu 22.10. (CVE-2021-20245)

It was discovered that ImageMagick incorrectly handled certain values
when performing resampling operations. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 22.10.
(CVE-2021-20246)

It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
22.10. (CVE-2021-20309)

It was discovered that ImageMagick incorrectly handled certain values
when processing thumbnail image data. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 22.10.
(CVE-2021-20312)

It was discovered that ImageMagick incorrectly handled memory cleanup
when performing certain cryptographic operations. Under certain conditions
sensitive cryptographic information could be disclosed. This issue only
affected Ubuntu 22.10. (CVE-2021-20313)

It was discovered that ImageMagick did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted file using convert command, an attacker could possibly use this
issue to cause ImageMagick to crash, resulting in a denial of service. This
issue only affected Ubuntu 22.10. (CVE-2021-3574)

It was discovered that ImageMagick did not use the correct rights when
specifically excluded by a module policy. An attacker could use this issue
to read and write certain restricted files. This issue only affected
Ubuntu 22.10. (CVE-2021-39212)

It was discovered that ImageMagick incorrectly handled certain values
when processing specially crafted SVG files. By tricking a user into
opening a specially crafted SVG file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
22.10. (CVE-2021-4219)

It was discovered that ImageMagick did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted DICOM file, an attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service or leaking sensitive
information. This issue only affected Ubuntu 22.10. (CVE-2022-1114)

It was discovered that ImageMagick incorrectly handled memory under
certain circumstances. If a user were tricked into opening a specially
crafted image file, an attacker could possibly exploit this issue to cause
a denial of service or other unspecified impact. This issue only affected
Ubuntu 22.10. (CVE-2022-28463)

It was discovered that ImageMagick incorrectly handled certain values.
If a user were tricked into processing a specially crafted image file,
an attacker could possibly exploit this issue to cause a denial of service
or other unspecified impact. This issue only affected Ubuntu 14.04 ESM,
Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32545, CVE-2022-32546)

It was discovered that ImageMagick incorrectly handled memory under
certain circumstances. If a user were tricked into processing a specially
crafted image file, an attacker could possibly exploit this issue to cause
a denial of service or other unspecified impact. This issue only affected
Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32547)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
imagemagick 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
imagemagick-6-common 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
imagemagick-6.q16 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
imagemagick-6.q16hdri 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
imagemagick-common 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libimage-magick-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libimage-magick-q16-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagick++-6.q16-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagick++-6.q16-dev 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagick++-6.q16hdri-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagick++-dev 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-6-arch-config 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-6-headers 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-6.q16-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-6.q16-dev 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-dev 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickwand-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickwand-6.q16-dev 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickwand-dev 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
perlmagick 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1

Ubuntu 18.04 LTS:
imagemagick 8:6.9.7.4+dfsg-16ubuntu6.14
imagemagick-6-common 8:6.9.7.4+dfsg-16ubuntu6.14
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu6.14
imagemagick-6.q16hdri 8:6.9.7.4+dfsg-16ubuntu6.14
imagemagick-common 8:6.9.7.4+dfsg-16ubuntu6.14
libimage-magick-perl 8:6.9.7.4+dfsg-16ubuntu6.14
libimage-magick-q16-perl 8:6.9.7.4+dfsg-16ubuntu6.14
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu6.14
libmagick++-6.q16-dev 8:6.9.7.4+dfsg-16ubuntu6.14
libmagick++-6.q16hdri-7 8:6.9.7.4+dfsg-16ubuntu6.14
libmagick++-dev 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-6-arch-config 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-6-headers 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-6.q16-dev 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-dev 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickwand-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickwand-6.q16-dev 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickwand-dev 8:6.9.7.4+dfsg-16ubuntu6.14
perlmagick 8:6.9.7.4+dfsg-16ubuntu6.14

Ubuntu 16.04 ESM:
imagemagick 8:6.8.9.9-7ubuntu5.16+esm5
imagemagick-6.q16 8:6.8.9.9-7ubuntu5.16+esm5
imagemagick-common 8:6.8.9.9-7ubuntu5.16+esm5
libimage-magick-perl 8:6.8.9.9-7ubuntu5.16+esm5
libimage-magick-q16-perl 8:6.8.9.9-7ubuntu5.16+esm5
libmagick++-6.q16-5v5 8:6.8.9.9-7ubuntu5.16+esm5
libmagick++-6.q16-dev 8:6.8.9.9-7ubuntu5.16+esm5
libmagick++-dev 8:6.8.9.9-7ubuntu5.16+esm5
libmagickcore-6-arch-config 8:6.8.9.9-7ubuntu5.16+esm5
libmagickcore-6-headers 8:6.8.9.9-7ubuntu5.16+esm5
libmagickcore-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm5
libmagickcore-6.q16-2-extra 8:6.8.9.9-7ubuntu5.16+esm5
libmagickcore-6.q16-dev 8:6.8.9.9-7ubuntu5.16+esm5
libmagickcore-dev 8:6.8.9.9-7ubuntu5.16+esm5
libmagickwand-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm5
libmagickwand-6.q16-dev 8:6.8.9.9-7ubuntu5.16+esm5
libmagickwand-dev 8:6.8.9.9-7ubuntu5.16+esm5
perlmagick 8:6.8.9.9-7ubuntu5.16+esm5

Ubuntu 14.04 ESM:
imagemagick 8:6.7.7.10-6ubuntu3.13+esm3
imagemagick-common 8:6.7.7.10-6ubuntu3.13+esm3
libmagick++-dev 8:6.7.7.10-6ubuntu3.13+esm3
libmagick++5 8:6.7.7.10-6ubuntu3.13+esm3
libmagickcore-dev 8:6.7.7.10-6ubuntu3.13+esm3
libmagickcore5 8:6.7.7.10-6ubuntu3.13+esm3
libmagickcore5-extra 8:6.7.7.10-6ubuntu3.13+esm3
libmagickwand-dev 8:6.7.7.10-6ubuntu3.13+esm3
libmagickwand5 8:6.7.7.10-6ubuntu3.13+esm3
perlmagick 8:6.7.7.10-6ubuntu3.13+esm3

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5736-1
CVE-2021-20224, CVE-2021-20241, CVE-2021-20243, CVE-2021-20244,
CVE-2021-20245, CVE-2021-20246, CVE-2021-20309, CVE-2021-20312,
CVE-2021-20313, CVE-2021-3574, CVE-2021-39212, CVE-2021-4219,
CVE-2022-1114, CVE-2022-28463, CVE-2022-32545, CVE-2022-32546,
CVE-2022-32547

Package Information:
  https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
  https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.7.4+dfsg-16ubuntu6.14