{"id":"USN-6985-1","summary":"imagemagick vulnerabilities","details":"It was discovered that ImageMagick incorrectly handled certain malformed\nimage files. If a user or automated system using ImageMagick were tricked\ninto opening a specially crafted image, an attacker could exploit this to\ncause a denial of service or execute code with the privileges of the user \ninvoking the program.\n","modified":"2026-02-10T04:45:04Z","published":"2024-09-04T12:58:54Z","related":["UBUNTU-CVE-2019-10131","UBUNTU-CVE-2019-10650","UBUNTU-CVE-2019-11470","UBUNTU-CVE-2019-11472","UBUNTU-CVE-2019-11597","UBUNTU-CVE-2019-11598","UBUNTU-CVE-2019-12974","UBUNTU-CVE-2019-12975","UBUNTU-CVE-2019-12976","UBUNTU-CVE-2019-12978","UBUNTU-CVE-2019-12979"],"upstream":["CVE-2019-10131","CVE-2019-10650","CVE-2019-11470","CVE-2019-11472","CVE-2019-11597","CVE-2019-11598","CVE-2019-12974","CVE-2019-12975","CVE-2019-12976","CVE-2019-12978","CVE-2019-12979","UBUNTU-CVE-2019-10131","UBUNTU-CVE-2019-10650","UBUNTU-CVE-2019-11470","UBUNTU-CVE-2019-11472","UBUNTU-CVE-2019-11597","UBUNTU-CVE-2019-11598","UBUNTU-CVE-2019-12974","UBUNTU-CVE-2019-12975","UBUNTU-CVE-2019-12976","UBUNTU-CVE-2019-12978","UBUNTU-CVE-2019-12979"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6985-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-10131"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-10650"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11470"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11472"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11597"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11598"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12974"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12975"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12976"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12978"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12979"}],"affected":[{"package":{"name":"imagemagick","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.7.7.10-6ubuntu3.13+esm9?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.7.7.10-6ubuntu3.13+esm9"}]}],"versions":["8:6.7.7.10-5ubuntu3","8:6.7.7.10-5ubuntu4","8:6.7.7.10-6ubuntu1","8:6.7.7.10-6ubuntu2","8:6.7.7.10-6ubuntu3","8:6.7.7.10-6ubuntu3.1","8:6.7.7.10-6ubuntu3.2","8:6.7.7.10-6ubuntu3.3","8:6.7.7.10-6ubuntu3.4","8:6.7.7.10-6ubuntu3.5","8:6.7.7.10-6ubuntu3.6","8:6.7.7.10-6ubuntu3.7","8:6.7.7.10-6ubuntu3.8","8:6.7.7.10-6ubuntu3.9","8:6.7.7.10-6ubuntu3.11","8:6.7.7.10-6ubuntu3.12","8:6.7.7.10-6ubuntu3.13","8:6.7.7.10-6ubuntu3.13+esm1","8:6.7.7.10-6ubuntu3.13+esm2","8:6.7.7.10-6ubuntu3.13+esm3","8:6.7.7.10-6ubuntu3.13+esm4","8:6.7.7.10-6ubuntu3.13+esm5","8:6.7.7.10-6ubuntu3.13+esm6","8:6.7.7.10-6ubuntu3.13+esm7","8:6.7.7.10-6ubuntu3.13+esm8"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm9","binary_name":"imagemagick"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm9","binary_name":"imagemagick-common"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm9","binary_name":"libmagick++-dev"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm9","binary_name":"libmagick++5"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm9","binary_name":"libmagickcore-dev"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm9","binary_name":"libmagickcore5"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm9","binary_name":"libmagickcore5-extra"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm9","binary_name":"libmagickwand-dev"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm9","binary_name":"libmagickwand5"},{"binary_version":"8:6.7.7.10-6ubuntu3.13+esm9","binary_name":"perlmagick"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6985-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-10131"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2019-10650"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-11470"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-11472"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-11597"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-11598"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-12974"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}],"id":"CVE-2019-12975"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}],"id":"CVE-2019-12976"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-12978"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-12979"}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}}],"schema_version":"1.7.3"}