{"id":"USN-6200-1","summary":"imagemagick vulnerabilities","details":"It was discovered that ImageMagick incorrectly handled the \"-authenticate\"\noption for password-protected PDF files. An attacker could possibly use\nthis issue to inject additional shell commands and perform arbitrary code\nexecution. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-29599)\n\nIt was discovered that ImageMagick incorrectly handled certain values\nwhen processing PDF files. If a user or automated system using ImageMagick\nwere tricked into opening a specially crafted PDF file, an attacker could\nexploit this to cause a denial of service. This issue only affected Ubuntu\n20.04 LTS. (CVE-2021-20224)\n\nZhang Xiaohui discovered that ImageMagick incorrectly handled certain\nvalues when processing image data. If a user or automated system using\nImageMagick were tricked into opening a specially crafted image, an\nattacker could exploit this to cause a denial of service. This issue only\naffected Ubuntu 20.04 LTS. (CVE-2021-20241, CVE-2021-20243)\n\nIt was discovered that ImageMagick incorrectly handled certain values\nwhen processing visual effects based image files. By tricking a user into\nopening a specially crafted image file, an attacker could crash the\napplication causing a denial of service. This issue only affected Ubuntu\n20.04 LTS. (CVE-2021-20244, CVE-2021-20309)\n\nIt was discovered that ImageMagick incorrectly handled certain values\nwhen performing resampling operations. By tricking a user into opening\na specially crafted image file, an attacker could crash the application\ncausing a denial of service. This issue only affected Ubuntu 20.04 LTS.\n(CVE-2021-20246)\n\nIt was discovered that ImageMagick incorrectly handled certain values\nwhen processing thumbnail image data. By tricking a user into opening\na specially crafted image file, an attacker could crash the application\ncausing a denial of service. This issue only affected Ubuntu 20.04 LTS.\n(CVE-2021-20312)\n\nIt was discovered that ImageMagick incorrectly handled memory cleanup\nwhen performing certain cryptographic operations. Under certain conditions\nsensitive cryptographic information could be disclosed. This issue only\naffected Ubuntu 20.04 LTS. (CVE-2021-20313)\n\nIt was discovered that ImageMagick did not use the correct rights when\nspecifically excluded by a module policy. An attacker could use this issue\nto read and write certain restricted files. This issue only affected Ubuntu\n20.04 LTS. (CVE-2021-39212)\n\nIt was discovered that ImageMagick incorrectly handled memory under certain\ncircumstances. If a user were tricked into opening a specially crafted\nimage file, an attacker could possibly exploit this issue to cause a denial\nof service or other unspecified impact. This issue only affected Ubuntu\n20.04 LTS. (CVE-2022-28463, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547)\n\nIt was discovered that ImageMagick incorrectly handled memory under certain\ncircumstances. If a user were tricked into opening a specially crafted\nimage file, an attacker could possibly exploit this issue to cause a denial\nof service or other unspecified impact. This issue only affected Ubuntu\n22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2021-3610, CVE-2023-1906,\nCVE-2023-3428)\n\nIt was discovered that ImageMagick incorrectly handled certain values\nwhen processing specially crafted SVG files. By tricking a user into\nopening a specially crafted SVG file, an attacker could crash the\napplication causing a denial of service. This issue only affected Ubuntu\n20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-1289)\n\nIt was discovered that ImageMagick incorrectly handled memory under certain\ncircumstances. If a user were tricked into opening a specially crafted\ntiff file, an attacker could possibly exploit this issue to cause a denial\nof service or other unspecified impact. This issue only affected Ubuntu\n22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-3195)\n\nIt was discovered that ImageMagick incorrectly handled memory under certain\ncircumstances. If a user were tricked into opening a specially crafted\nimage file, an attacker could possibly exploit this issue to cause a denial\nof service or other unspecified impact. (CVE-2023-34151)\n","modified":"2026-04-22T10:36:14.220022Z","published":"2023-07-04T09:23:39Z","related":["UBUNTU-CVE-2020-29599","UBUNTU-CVE-2021-20224","UBUNTU-CVE-2021-20241","UBUNTU-CVE-2021-20243","UBUNTU-CVE-2021-20244","UBUNTU-CVE-2021-20246","UBUNTU-CVE-2021-20309","UBUNTU-CVE-2021-20312","UBUNTU-CVE-2021-20313","UBUNTU-CVE-2021-3610","UBUNTU-CVE-2021-39212","UBUNTU-CVE-2022-28463","UBUNTU-CVE-2022-32545","UBUNTU-CVE-2022-32546","UBUNTU-CVE-2022-32547","UBUNTU-CVE-2023-1289","UBUNTU-CVE-2023-1906","UBUNTU-CVE-2023-3195","UBUNTU-CVE-2023-34151","UBUNTU-CVE-2023-3428"],"upstream":["CVE-2020-29599","CVE-2021-20224","CVE-2021-20241","CVE-2021-20243","CVE-2021-20244","CVE-2021-20246","CVE-2021-20309","CVE-2021-20312","CVE-2021-20313","CVE-2021-3610","CVE-2021-39212","CVE-2022-28463","CVE-2022-32545","CVE-2022-32546","CVE-2022-32547","CVE-2023-1289","CVE-2023-1906","CVE-2023-3195","CVE-2023-34151","CVE-2023-3428","UBUNTU-CVE-2020-29599","UBUNTU-CVE-2021-20224","UBUNTU-CVE-2021-20241","UBUNTU-CVE-2021-20243","UBUNTU-CVE-2021-20244","UBUNTU-CVE-2021-20246","UBUNTU-CVE-2021-20309","UBUNTU-CVE-2021-20312","UBUNTU-CVE-2021-20313","UBUNTU-CVE-2021-3610","UBUNTU-CVE-2021-39212","UBUNTU-CVE-2022-28463","UBUNTU-CVE-2022-32545","UBUNTU-CVE-2022-32546","UBUNTU-CVE-2022-32547","UBUNTU-CVE-2023-1289","UBUNTU-CVE-2023-1906","UBUNTU-CVE-2023-3195","UBUNTU-CVE-2023-34151","UBUNTU-CVE-2023-3428"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6200-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-29599"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3610"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20224"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20241"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20243"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20244"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20246"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20309"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20312"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20313"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-39212"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-28463"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32545"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32546"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32547"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1289"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1906"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3195"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3428"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-34151"}],"affected":[{"package":{"name":"imagemagick","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.8.9.9-7ubuntu5.16+esm8?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.8.9.9-7ubuntu5.16+esm8"}]}],"versions":["8:6.8.9.9-5ubuntu2","8:6.8.9.9-6","8:6.8.9.9-6build1","8:6.8.9.9-7","8:6.8.9.9-7ubuntu1","8:6.8.9.9-7ubuntu2","8:6.8.9.9-7ubuntu3","8:6.8.9.9-7ubuntu4","8:6.8.9.9-7ubuntu5","8:6.8.9.9-7ubuntu5.1","8:6.8.9.9-7ubuntu5.2","8:6.8.9.9-7ubuntu5.3","8:6.8.9.9-7ubuntu5.4","8:6.8.9.9-7ubuntu5.5","8:6.8.9.9-7ubuntu5.6","8:6.8.9.9-7ubuntu5.7","8:6.8.9.9-7ubuntu5.8","8:6.8.9.9-7ubuntu5.9","8:6.8.9.9-7ubuntu5.11","8:6.8.9.9-7ubuntu5.12","8:6.8.9.9-7ubuntu5.13","8:6.8.9.9-7ubuntu5.14","8:6.8.9.9-7ubuntu5.15","8:6.8.9.9-7ubuntu5.16","8:6.8.9.9-7ubuntu5.16+esm1","8:6.8.9.9-7ubuntu5.16+esm2","8:6.8.9.9-7ubuntu5.16+esm3","8:6.8.9.9-7ubuntu5.16+esm4","8:6.8.9.9-7ubuntu5.16+esm5","8:6.8.9.9-7ubuntu5.16+esm6","8:6.8.9.9-7ubuntu5.16+esm7"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"imagemagick"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"imagemagick-6.q16"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"imagemagick-common"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"libimage-magick-perl"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"libimage-magick-q16-perl"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"libmagick++-6-headers"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"libmagick++-6.q16-5v5"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"libmagickcore-6-arch-config"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"libmagickcore-6-headers"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"libmagickcore-6.q16-2"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"libmagickcore-6.q16-2-extra"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"libmagickwand-6-headers"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"libmagickwand-6.q16-2"},{"binary_version":"8:6.8.9.9-7ubuntu5.16+esm8","binary_name":"perlmagick"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6200-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"id":"CVE-2023-34151","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]}}},{"package":{"name":"imagemagick","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.9.7.4+dfsg-16ubuntu6.15+esm1?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1"}]}],"versions":["8:6.9.7.4+dfsg-16ubuntu2","8:6.9.7.4+dfsg-16ubuntu3","8:6.9.7.4+dfsg-16ubuntu4","8:6.9.7.4+dfsg-16ubuntu5","8:6.9.7.4+dfsg-16ubuntu6","8:6.9.7.4+dfsg-16ubuntu6.2","8:6.9.7.4+dfsg-16ubuntu6.3","8:6.9.7.4+dfsg-16ubuntu6.4","8:6.9.7.4+dfsg-16ubuntu6.7","8:6.9.7.4+dfsg-16ubuntu6.8","8:6.9.7.4+dfsg-16ubuntu6.9","8:6.9.7.4+dfsg-16ubuntu6.11","8:6.9.7.4+dfsg-16ubuntu6.12","8:6.9.7.4+dfsg-16ubuntu6.13","8:6.9.7.4+dfsg-16ubuntu6.14","8:6.9.7.4+dfsg-16ubuntu6.15"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"imagemagick"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"imagemagick-6-common"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"imagemagick-6.q16"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"imagemagick-6.q16hdri"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"imagemagick-common"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libimage-magick-perl"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libimage-magick-q16-perl"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libimage-magick-q16hdri-perl"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libmagick++-6-headers"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libmagick++-6.q16-7"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libmagick++-6.q16hdri-7"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libmagickcore-6-arch-config"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libmagickcore-6-headers"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libmagickcore-6.q16-3"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libmagickcore-6.q16-3-extra"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libmagickcore-6.q16hdri-3"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libmagickcore-6.q16hdri-3-extra"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libmagickwand-6-headers"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libmagickwand-6.q16-3"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"libmagickwand-6.q16hdri-3"},{"binary_version":"8:6.9.7.4+dfsg-16ubuntu6.15+esm1","binary_name":"perlmagick"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6200-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"id":"CVE-2023-34151","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]}}},{"package":{"name":"imagemagick","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.9.10.23+dfsg-2.1ubuntu11.9?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.9.10.23+dfsg-2.1ubuntu11.9"}]}],"versions":["8:6.9.10.23+dfsg-2.1ubuntu3","8:6.9.10.23+dfsg-2.1ubuntu8","8:6.9.10.23+dfsg-2.1ubuntu9","8:6.9.10.23+dfsg-2.1ubuntu10","8:6.9.10.23+dfsg-2.1ubuntu11","8:6.9.10.23+dfsg-2.1ubuntu11.1","8:6.9.10.23+dfsg-2.1ubuntu11.2","8:6.9.10.23+dfsg-2.1ubuntu11.4","8:6.9.10.23+dfsg-2.1ubuntu11.5","8:6.9.10.23+dfsg-2.1ubuntu11.6","8:6.9.10.23+dfsg-2.1ubuntu11.7"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"imagemagick"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"imagemagick-6-common"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"imagemagick-6.q16"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"imagemagick-6.q16hdri"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"imagemagick-common"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libimage-magick-perl"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libimage-magick-q16-perl"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libimage-magick-q16hdri-perl"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libmagick++-6-headers"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libmagick++-6.q16-8"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libmagick++-6.q16hdri-8"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libmagickcore-6-arch-config"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libmagickcore-6-headers"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libmagickcore-6.q16-6"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libmagickcore-6.q16-6-extra"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libmagickcore-6.q16hdri-6"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libmagickcore-6.q16hdri-6-extra"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libmagickwand-6-headers"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libmagickwand-6.q16-6"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"libmagickwand-6.q16hdri-6"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.9","binary_name":"perlmagick"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6200-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2020-29599","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}]},{"id":"CVE-2021-20224","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-20241","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20243","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20244","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20246","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20309","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20312","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-20313","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2021-39212","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2022-28463","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-32545","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-32546","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-32547","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}]}}},{"package":{"name":"imagemagick","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2"}]}],"versions":["8:6.9.11.60+dfsg-1ubuntu1","8:6.9.11.60+dfsg-1.3","8:6.9.11.60+dfsg-1.3build1","8:6.9.11.60+dfsg-1.3build2","8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1","8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1+esm1","8:6.9.11.60+dfsg-1.3ubuntu0.22.04.2","8:6.9.11.60+dfsg-1.3ubuntu0.22.04.2+esm1","8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3","8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"imagemagick"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"imagemagick-6-common"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"imagemagick-6.q16"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"imagemagick-6.q16hdri"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"imagemagick-common"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libimage-magick-perl"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libimage-magick-q16-perl"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libimage-magick-q16hdri-perl"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libmagick++-6-headers"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libmagick++-6.q16-8"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libmagick++-6.q16hdri-8"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libmagickcore-6-arch-config"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libmagickcore-6-headers"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libmagickcore-6.q16-6"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libmagickcore-6.q16-6-extra"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libmagickcore-6.q16hdri-6"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libmagickcore-6.q16hdri-6-extra"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libmagickwand-6-headers"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libmagickwand-6.q16-6"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"libmagickwand-6.q16hdri-6"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2","binary_name":"perlmagick"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6200-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:22.04:LTS","cves":[{"id":"CVE-2021-3610","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-1906","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-3195","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-3428","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]}}}],"schema_version":"1.7.5"}