{"id":"USN-5158-1","summary":"imagemagick vulnerabilities","details":"\nIt was discovered that ImageMagick incorrectly handled certain values\nwhen processing visual effects based image files. By tricking a user into\nopening a specially crafted image file, an attacker could crash the\napplication causing a denial of service. (CVE-2021-20244)\n\nIt was discovered that ImageMagick incorrectly handled certain values\nwhen performing resampling operations. By tricking a user into opening\na specially crafted image file, an attacker could crash the application \ncausing a denial of service. (CVE-2021-20246)\n\nIt was discovered that ImageMagick incorrectly handled certain values\nwhen processing visual effects based image files. By tricking a user into\nopening a specially crafted image file, an attacker could crash the\napplication causing a denial of service (CVE-2021-20309)\n\nIt was discovered that ImageMagick incorrectly handled certain values\nwhen processing thumbnail image data. By tricking a user into opening\na specially crafted image file, an attacker could crash the application \ncausing a denial of service. (CVE-2021-20312)\n\nIt was discovered that ImageMagick incorrectly handled memory cleanup\nwhen performing certain cryptographic operations. Under certain conditions\nsensitive cryptographic information could be disclosed. (CVE-2021-20313)\n\n","modified":"2026-04-27T16:00:34.856297Z","published":"2021-11-29T23:50:45Z","related":["UBUNTU-CVE-2021-20244","UBUNTU-CVE-2021-20246","UBUNTU-CVE-2021-20309","UBUNTU-CVE-2021-20312","UBUNTU-CVE-2021-20313"],"upstream":["CVE-2021-20244","CVE-2021-20246","CVE-2021-20309","CVE-2021-20312","CVE-2021-20313","UBUNTU-CVE-2021-20244","UBUNTU-CVE-2021-20246","UBUNTU-CVE-2021-20309","UBUNTU-CVE-2021-20312","UBUNTU-CVE-2021-20313"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5158-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20244"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20246"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20309"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20312"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20313"}],"affected":[{"package":{"name":"imagemagick","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.7.7.10-6ubuntu3.13+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.7.7.10-6ubuntu3.13+esm1"}]}],"versions":["8:6.7.7.10-5ubuntu3","8:6.7.7.10-5ubuntu4","8:6.7.7.10-6ubuntu1","8:6.7.7.10-6ubuntu2","8:6.7.7.10-6ubuntu3","8:6.7.7.10-6ubuntu3.1","8:6.7.7.10-6ubuntu3.2","8:6.7.7.10-6ubuntu3.3","8:6.7.7.10-6ubuntu3.4","8:6.7.7.10-6ubuntu3.5","8:6.7.7.10-6ubuntu3.6","8:6.7.7.10-6ubuntu3.7","8:6.7.7.10-6ubuntu3.8","8:6.7.7.10-6ubuntu3.9","8:6.7.7.10-6ubuntu3.11","8:6.7.7.10-6ubuntu3.12","8:6.7.7.10-6ubuntu3.13"],"ecosystem_specific":{"binaries":[{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm1","binary_name":"imagemagick"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm1","binary_name":"imagemagick-common"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm1","binary_name":"libmagick++5"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm1","binary_name":"libmagickcore5"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm1","binary_name":"libmagickcore5-extra"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm1","binary_name":"libmagickwand5"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm1","binary_name":"perlmagick"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5158-1.json","cves_map":{"cves":[{"id":"CVE-2021-20244","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20246","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20309","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20312","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20313","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}},{"package":{"name":"imagemagick","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.8.9.9-7ubuntu5.16+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.8.9.9-7ubuntu5.16+esm1"}]}],"versions":["8:6.8.9.9-5ubuntu2","8:6.8.9.9-6","8:6.8.9.9-6build1","8:6.8.9.9-7","8:6.8.9.9-7ubuntu1","8:6.8.9.9-7ubuntu2","8:6.8.9.9-7ubuntu3","8:6.8.9.9-7ubuntu4","8:6.8.9.9-7ubuntu5","8:6.8.9.9-7ubuntu5.1","8:6.8.9.9-7ubuntu5.2","8:6.8.9.9-7ubuntu5.3","8:6.8.9.9-7ubuntu5.4","8:6.8.9.9-7ubuntu5.5","8:6.8.9.9-7ubuntu5.6","8:6.8.9.9-7ubuntu5.7","8:6.8.9.9-7ubuntu5.8","8:6.8.9.9-7ubuntu5.9","8:6.8.9.9-7ubuntu5.11","8:6.8.9.9-7ubuntu5.12","8:6.8.9.9-7ubuntu5.13","8:6.8.9.9-7ubuntu5.14","8:6.8.9.9-7ubuntu5.15","8:6.8.9.9-7ubuntu5.16"],"ecosystem_specific":{"binaries":[{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"imagemagick"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"imagemagick-6.q16"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"imagemagick-common"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"libimage-magick-perl"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"libimage-magick-q16-perl"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"libmagick++-6-headers"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"libmagick++-6.q16-5v5"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"libmagickcore-6-arch-config"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"libmagickcore-6-headers"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"libmagickcore-6.q16-2"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"libmagickcore-6.q16-2-extra"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"libmagickwand-6-headers"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"libmagickwand-6.q16-2"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm1","binary_name":"perlmagick"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5158-1.json","cves_map":{"cves":[{"id":"CVE-2021-20244","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20246","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20309","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20312","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20313","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}},{"package":{"name":"imagemagick","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.9.7.4+dfsg-16ubuntu6.12?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.9.7.4+dfsg-16ubuntu6.12"}]}],"versions":["8:6.9.7.4+dfsg-16ubuntu2","8:6.9.7.4+dfsg-16ubuntu3","8:6.9.7.4+dfsg-16ubuntu4","8:6.9.7.4+dfsg-16ubuntu5","8:6.9.7.4+dfsg-16ubuntu6","8:6.9.7.4+dfsg-16ubuntu6.2","8:6.9.7.4+dfsg-16ubuntu6.3","8:6.9.7.4+dfsg-16ubuntu6.4","8:6.9.7.4+dfsg-16ubuntu6.7","8:6.9.7.4+dfsg-16ubuntu6.8","8:6.9.7.4+dfsg-16ubuntu6.9","8:6.9.7.4+dfsg-16ubuntu6.11"],"ecosystem_specific":{"binaries":[{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"imagemagick"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"imagemagick-6-common"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"imagemagick-6.q16"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"imagemagick-6.q16hdri"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"imagemagick-common"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libimage-magick-perl"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libimage-magick-q16-perl"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libimage-magick-q16hdri-perl"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libmagick++-6-headers"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libmagick++-6.q16-7"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libmagick++-6.q16hdri-7"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libmagickcore-6-arch-config"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libmagickcore-6-headers"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libmagickcore-6.q16-3"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libmagickcore-6.q16-3-extra"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libmagickcore-6.q16hdri-3"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libmagickcore-6.q16hdri-3-extra"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libmagickwand-6-headers"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libmagickwand-6.q16-3"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"libmagickwand-6.q16hdri-3"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.12","binary_name":"perlmagick"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5158-1.json","cves_map":{"cves":[{"id":"CVE-2021-20244","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20246","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20309","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20312","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20313","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.5"}