{"id":"USN-6200-2","summary":"imagemagick vulnerabilities","details":"\nUSN-6200-1 fixed vulnerabilities in ImageMagick. Unfortunately these fixes were\nincomplete for Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. This update fixes the\nproblem.\n\nOriginal advisory details:\n\n It was discovered that ImageMagick incorrectly handled the \"-authenticate\"\n option for password-protected PDF files. An attacker could possibly use\n this issue to inject additional shell commands and perform arbitrary code\n execution. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-29599)\n \n It was discovered that ImageMagick incorrectly handled certain values\n when processing PDF files. If a user or automated system using ImageMagick\n were tricked into opening a specially crafted PDF file, an attacker could\n exploit this to cause a denial of service. This issue only affected Ubuntu\n 20.04 LTS. (CVE-2021-20224)\n \n Zhang Xiaohui discovered that ImageMagick incorrectly handled certain\n values when processing image data. If a user or automated system using\n ImageMagick were tricked into opening a specially crafted image, an\n attacker could exploit this to cause a denial of service. This issue only\n affected Ubuntu 20.04 LTS. (CVE-2021-20241, CVE-2021-20243)\n \n It was discovered that ImageMagick incorrectly handled certain values\n when processing visual effects based image files. By tricking a user into\n opening a specially crafted image file, an attacker could crash the\n application causing a denial of service. This issue only affected Ubuntu\n 20.04 LTS. (CVE-2021-20244, CVE-2021-20309)\n \n It was discovered that ImageMagick incorrectly handled certain values\n when performing resampling operations. By tricking a user into opening\n a specially crafted image file, an attacker could crash the application\n causing a denial of service. This issue only affected Ubuntu 20.04 LTS.\n (CVE-2021-20246)\n \n It was discovered that ImageMagick incorrectly handled certain values\n when processing thumbnail image data. By tricking a user into opening\n a specially crafted image file, an attacker could crash the application\n causing a denial of service. This issue only affected Ubuntu 20.04 LTS.\n (CVE-2021-20312)\n \n It was discovered that ImageMagick incorrectly handled memory cleanup\n when performing certain cryptographic operations. Under certain conditions\n sensitive cryptographic information could be disclosed. This issue only\n affected Ubuntu 20.04 LTS. (CVE-2021-20313)\n \n It was discovered that ImageMagick did not use the correct rights when\n specifically excluded by a module policy. An attacker could use this issue\n to read and write certain restricted files. This issue only affected Ubuntu\n 20.04 LTS. (CVE-2021-39212)\n \n It was discovered that ImageMagick incorrectly handled memory under certain\n circumstances. If a user were tricked into opening a specially crafted\n image file, an attacker could possibly exploit this issue to cause a denial\n of service or other unspecified impact. This issue only affected Ubuntu\n 20.04 LTS. (CVE-2022-28463, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547)\n \n It was discovered that ImageMagick incorrectly handled memory under certain\n circumstances. If a user were tricked into opening a specially crafted\n image file, an attacker could possibly exploit this issue to cause a denial\n of service or other unspecified impact. This issue only affected Ubuntu\n 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2021-3610, CVE-2023-1906,\n CVE-2023-3428)\n \n It was discovered that ImageMagick incorrectly handled certain values\n when processing specially crafted SVG files. By tricking a user into\n opening a specially crafted SVG file, an attacker could crash the\n application causing a denial of service. This issue only affected Ubuntu\n 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-1289)\n \n It was discovered that ImageMagick incorrectly handled memory under certain\n circumstances. If a user were tricked into opening a specially crafted\n tiff file, an attacker could possibly exploit this issue to cause a denial\n of service or other unspecified impact. This issue only affected Ubuntu\n 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-3195)\n \n It was discovered that ImageMagick incorrectly handled memory under certain\n circumstances. If a user were tricked into opening a specially crafted\n image file, an attacker could possibly exploit this issue to cause a denial\n of service or other unspecified impact. (CVE-2023-34151)\n","modified":"2026-04-27T16:45:44.693214Z","published":"2024-07-25T23:55:00Z","related":["UBUNTU-CVE-2023-1289","UBUNTU-CVE-2023-34151"],"upstream":["CVE-2023-1289","CVE-2023-34151","UBUNTU-CVE-2023-1289","UBUNTU-CVE-2023-34151"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6200-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1289"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-34151"}],"affected":[{"package":{"name":"imagemagick","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.9.10.23+dfsg-2.1ubuntu11.10?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.9.10.23+dfsg-2.1ubuntu11.10"}]}],"versions":["8:6.9.10.23+dfsg-2.1ubuntu3","8:6.9.10.23+dfsg-2.1ubuntu8","8:6.9.10.23+dfsg-2.1ubuntu9","8:6.9.10.23+dfsg-2.1ubuntu10","8:6.9.10.23+dfsg-2.1ubuntu11","8:6.9.10.23+dfsg-2.1ubuntu11.1","8:6.9.10.23+dfsg-2.1ubuntu11.2","8:6.9.10.23+dfsg-2.1ubuntu11.4","8:6.9.10.23+dfsg-2.1ubuntu11.5","8:6.9.10.23+dfsg-2.1ubuntu11.6","8:6.9.10.23+dfsg-2.1ubuntu11.7","8:6.9.10.23+dfsg-2.1ubuntu11.9"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"imagemagick"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"imagemagick-6-common"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"imagemagick-6.q16"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"imagemagick-6.q16hdri"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"imagemagick-common"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libimage-magick-perl"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libimage-magick-q16-perl"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libimage-magick-q16hdri-perl"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libmagick++-6-headers"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libmagick++-6.q16-8"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libmagick++-6.q16hdri-8"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libmagickcore-6-arch-config"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libmagickcore-6-headers"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libmagickcore-6.q16-6"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libmagickcore-6.q16-6-extra"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libmagickcore-6.q16hdri-6"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libmagickcore-6.q16hdri-6-extra"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libmagickwand-6-headers"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libmagickwand-6.q16-6"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"libmagickwand-6.q16hdri-6"},{"binary_version":"8:6.9.10.23+dfsg-2.1ubuntu11.10","binary_name":"perlmagick"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2023-1289","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2023-34151","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6200-2.json"}},{"package":{"name":"imagemagick","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5"}]}],"versions":["8:6.9.11.60+dfsg-1ubuntu1","8:6.9.11.60+dfsg-1.3","8:6.9.11.60+dfsg-1.3build1","8:6.9.11.60+dfsg-1.3build2","8:6.9.11.60+dfsg-1.3ubuntu0.22.04.1","8:6.9.11.60+dfsg-1.3ubuntu0.22.04.2","8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"imagemagick"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"imagemagick-6-common"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"imagemagick-6.q16"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"imagemagick-6.q16hdri"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"imagemagick-common"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libimage-magick-perl"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libimage-magick-q16-perl"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libimage-magick-q16hdri-perl"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libmagick++-6-headers"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libmagick++-6.q16-8"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libmagick++-6.q16hdri-8"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libmagickcore-6-arch-config"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libmagickcore-6-headers"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libmagickcore-6.q16-6"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libmagickcore-6.q16-6-extra"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libmagickcore-6.q16hdri-6"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libmagickcore-6.q16hdri-6-extra"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libmagickwand-6-headers"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libmagickwand-6.q16-6"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"libmagickwand-6.q16hdri-6"},{"binary_version":"8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5","binary_name":"perlmagick"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2023-1289","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2023-34151","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6200-2.json"}}],"schema_version":"1.7.5"}