{"id":"USN-5736-2","summary":"imagemagick vulnerabilities","details":"USN-5736-1 fixed vulnerabilities in ImageMagick. This update provides the\ncorresponding updates for Ubuntu 20.04 ESM and Ubuntu 22.04 ESM. One of the\nissues, CVE-2021-20224, only affected Ubuntu 20.04 ESM, while\nCVE-2021-20245, CVE-2021-3574, CVE-2021-4219 and CVE-2022-1114 only\naffected Ubuntu 22.04 ESM.\n\nOriginal advisory details:\n\n It was discovered that ImageMagick incorrectly handled certain values\n when processing PDF files. If a user or automated system using ImageMagick\n were tricked into opening a specially crafted PDF file, an attacker could\n exploit this to cause a denial of service. This issue only affected Ubuntu\n 14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. (CVE-2021-20224)\n \n Zhang Xiaohui discovered that ImageMagick incorrectly handled certain\n values when processing image data. If a user or automated system using\n ImageMagick were tricked into opening a specially crafted image, an\n attacker could exploit this to cause a denial of service. This issue only\n affected Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2021-20241)\n \n Zhang Xiaohui discovered that ImageMagick incorrectly handled certain\n values when processing image data. If a user or automated system using\n ImageMagick were tricked into opening a specially crafted image, an\n attacker could exploit this to cause a denial of service. This issue only\n affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10.\n (CVE-2021-20243)\n \n It was discovered that ImageMagick incorrectly handled certain values\n when processing visual effects based image files. By tricking a user into\n opening a specially crafted image file, an attacker could crash the\n application causing a denial of service. This issue only affected Ubuntu\n 22.10. (CVE-2021-20244)\n \n It was discovered that ImageMagick could be made to divide by zero when\n processing crafted files. By tricking a user into opening a specially\n crafted image file, an attacker could crash the application causing a\n denial of service. This issue only affected Ubuntu 22.10. (CVE-2021-20245)\n \n It was discovered that ImageMagick incorrectly handled certain values\n when performing resampling operations. By tricking a user into opening\n a specially crafted image file, an attacker could crash the application\n causing a denial of service. This issue only affected Ubuntu 22.10.\n (CVE-2021-20246)\n \n It was discovered that ImageMagick incorrectly handled certain values\n when processing visual effects based image files. By tricking a user into\n opening a specially crafted image file, an attacker could crash the\n application causing a denial of service. This issue only affected Ubuntu\n 22.10. (CVE-2021-20309)\n \n It was discovered that ImageMagick incorrectly handled certain values\n when processing thumbnail image data. By tricking a user into opening\n a specially crafted image file, an attacker could crash the application\n causing a denial of service. This issue only affected Ubuntu 22.10.\n (CVE-2021-20312)\n \n It was discovered that ImageMagick incorrectly handled memory cleanup\n when performing certain cryptographic operations. Under certain conditions\n sensitive cryptographic information could be disclosed. This issue only\n affected Ubuntu 22.10. (CVE-2021-20313)\n \n It was discovered that ImageMagick did not properly manage memory under\n certain circumstances. If a user were tricked into opening a specially\n crafted file using the convert command, an attacker could possibly use\n this issue to cause ImageMagick to crash, resulting in a denial of\n service. This issue only affected Ubuntu 22.10. (CVE-2021-3574)\n \n It was discovered that ImageMagick did not use the correct rights when\n specifically excluded by a module policy. An attacker could use this issue\n to read and write certain restricted files. This issue only affected\n Ubuntu 22.10. (CVE-2021-39212)\n \n It was discovered that ImageMagick incorrectly handled certain values\n when processing specially crafted SVG files. By tricking a user into\n opening a specially crafted SVG file, an attacker could crash the\n application causing a denial of service. This issue only affected Ubuntu\n 22.10. (CVE-2021-4219)\n \n It was discovered that ImageMagick did not properly manage memory under\n certain circumstances. If a user were tricked into opening a specially\n crafted DICOM file, an attacker could possibly use this issue to cause\n ImageMagick to crash, resulting in a denial of service, or expose sensitive\n information. This issue only affected Ubuntu 22.10. (CVE-2022-1114)\n \n It was discovered that ImageMagick incorrectly handled memory under\n certain circumstances. If a user were tricked into opening a specially\n crafted image file, an attacker could possibly exploit this issue to cause\n a denial of service or other unspecified impact. This issue only affected\n Ubuntu 22.10. (CVE-2022-28463)\n \n It was discovered that ImageMagick incorrectly handled certain values.\n If a user were tricked into processing a specially crafted image file,\n an attacker could possibly exploit this issue to cause a denial of service\n or other unspecified impact. This issue only affected Ubuntu 14.04 ESM,\n Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32545, CVE-2022-32546)\n \n It was discovered that ImageMagick incorrectly handled memory under\n certain circumstances. If a user were tricked into processing a specially\n crafted image file, an attacker could possibly exploit this issue to cause\n a denial of service or other unspecified impact. This issue only affected\n Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32547)\n","modified":"2026-04-27T16:32:23.475548582Z","published":"2022-11-24T11:23:13Z","related":["UBUNTU-CVE-2021-20224","UBUNTU-CVE-2021-20241","UBUNTU-CVE-2021-20243","UBUNTU-CVE-2021-20244","UBUNTU-CVE-2021-20245","UBUNTU-CVE-2021-20246","UBUNTU-CVE-2021-20309","UBUNTU-CVE-2021-20312","UBUNTU-CVE-2021-20313","UBUNTU-CVE-2021-3574","UBUNTU-CVE-2021-39212","UBUNTU-CVE-2021-4219","UBUNTU-CVE-2022-1114","UBUNTU-CVE-2022-28463","UBUNTU-CVE-2022-32545","UBUNTU-CVE-2022-32546","UBUNTU-CVE-2022-32547"],"upstream":["CVE-2021-20224","CVE-2021-20241","CVE-2021-20243","CVE-2021-20244","CVE-2021-20245","CVE-2021-20246","CVE-2021-20309","CVE-2021-20312","CVE-2021-20313","CVE-2021-3574","CVE-2021-39212","CVE-2021-4219","CVE-2022-1114","CVE-2022-28463","CVE-2022-32545","CVE-2022-32546","CVE-2022-32547","UBUNTU-CVE-2021-20224","UBUNTU-CVE-2021-20241","UBUNTU-CVE-2021-20243","UBUNTU-CVE-2021-20244","UBUNTU-CVE-2021-20245","UBUNTU-CVE-2021-20246","UBUNTU-CVE-2021-20309","UBUNTU-CVE-2021-20312","UBUNTU-CVE-2021-20313","UBUNTU-CVE-2021-3574","UBUNTU-CVE-2021-39212","UBUNTU-CVE-2021-4219","UBUNTU-CVE-2022-1114","UBUNTU-CVE-2022-28463","UBUNTU-CVE-2022-32545","UBUNTU-CVE-2022-32546","UBUNTU-CVE-2022-32547"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5736-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3574"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-4219"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20224"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20241"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20243"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20244"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20245"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20246"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20309"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20312"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20313"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-39212"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1114"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-28463"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32545"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32546"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32547"}],"affected":[{"package":{"name":"imagemagick","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"}]}],"versions":["8:6.9.10.23+dfsg-2.1ubuntu3","8:6.9.10.23+dfsg-2.1ubuntu8","8:6.9.10.23+dfsg-2.1ubuntu9","8:6.9.10.23+dfsg-2.1ubuntu10","8:6.9.10.23+dfsg-2.1ubuntu11","8:6.9.10.23+dfsg-2.1ubuntu11.1","8:6.9.10.23+dfsg-2.1ubuntu11.2","8:6.9.10.23+dfsg-2.1ubuntu11.4"],"ecosystem_specific":{"binaries":[{"binary_name":"imagemagick","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"imagemagick-6-common","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"imagemagick-6.q16","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"imagemagick-6.q16hdri","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"imagemagick-common","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libimage-magick-perl","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libimage-magick-q16-perl","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libimage-magick-q16hdri-perl","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libmagick++-6-headers","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libmagick++-6.q16-8","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libmagick++-6.q16hdri-8","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libmagickcore-6-arch-config","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libmagickcore-6-headers","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libmagickcore-6.q16-6","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libmagickcore-6.q16-6-extra","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libmagickcore-6.q16hdri-6","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libmagickcore-6.q16hdri-6-extra","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libmagickwand-6-headers","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libmagickwand-6.q16-6","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"libmagickwand-6.q16hdri-6","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"},{"binary_name":"perlmagick","binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.4+esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5736-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-20224"}]}}},{"package":{"name":"imagemagick","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"}]}],"versions":["8:6.9.11.60+dfsg-1ubuntu1","8:6.9.11.60+dfsg-1.3","8:6.9.11.60+dfsg-1.3build1","8:6.9.11.60+dfsg-1.3build2","8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"imagemagick","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"imagemagick-6-common","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"imagemagick-6.q16","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"imagemagick-6.q16hdri","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"imagemagick-common","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libimage-magick-perl","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libimage-magick-q16-perl","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libimage-magick-q16hdri-perl","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libmagick++-6-headers","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libmagick++-6.q16-8","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libmagick++-6.q16hdri-8","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libmagickcore-6-arch-config","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libmagickcore-6-headers","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libmagickcore-6.q16-6","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libmagickcore-6.q16-6-extra","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libmagickcore-6.q16hdri-6","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libmagickcore-6.q16hdri-6-extra","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libmagickwand-6-headers","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libmagickwand-6.q16-6","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"libmagickwand-6.q16hdri-6","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"},{"binary_name":"perlmagick","binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5736-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3574"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-4219"},{"id":"CVE-2021-20241","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-20243"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-20244"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-20245"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-20246"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-20309"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-20312"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-20313"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-39212"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-1114"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-28463"},{"id":"CVE-2022-32545","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-32546"},{"id":"CVE-2022-32547","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.5"}