Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ImageMagick
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ImageMagick
ID: USN-5736-1
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS, Ubuntu 14.04 ESM, Ubuntu 16.04 ESM, Ubuntu 22.10
Datum: Do, 24. November 2022, 21:23
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3574
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1114
Applikationen: ImageMagick

Originalnachricht


--===============7365931600659305269==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="dkmz4epkjxggnhlf"
Content-Disposition: inline


--dkmz4epkjxggnhlf
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-5736-1
November 24, 2022

imagemagick vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in ImageMagick.

Software Description:
- imagemagick: Image manipulation programs and library

Details:

It was discovered that ImageMagick incorrectly handled certain values
when processing PDF files. If a user or automated system using ImageMagick
were tricked into opening a specially crafted PDF file, an attacker could
exploit this to cause a denial of service. This issue only affected Ubuntu
14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. (CVE-2021-20224)

Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
values when processing image data. If a user or automated system using
ImageMagick were tricked into opening a specially crafted image, an
attacker could exploit this to cause a denial of service. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2021-20241)

Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
values when processing image data. If a user or automated system using
ImageMagick were tricked into opening a specially crafted image, an
attacker could exploit this to cause a denial of service. This issue only
affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10.
(CVE-2021-20243)

It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
22.10. (CVE-2021-20244)

It was discovered that ImageMagick could be made to divide by zero when
processing crafted file. By tricking a user into opening a specially
crafted image file, an attacker could crash the application causing a
denial of service. This issue only affected Ubuntu 22.10. (CVE-2021-20245)

It was discovered that ImageMagick incorrectly handled certain values
when performing resampling operations. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 22.10.
(CVE-2021-20246)

It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
22.10. (CVE-2021-20309)

It was discovered that ImageMagick incorrectly handled certain values
when processing thumbnail image data. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 22.10.
(CVE-2021-20312)

It was discovered that ImageMagick incorrectly handled memory cleanup
when performing certain cryptographic operations. Under certain conditions
sensitive cryptographic information could be disclosed. This issue only
affected Ubuntu 22.10. (CVE-2021-20313)

It was discovered that ImageMagick did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted file using convert command, an attacker could possibly use this
issue to cause ImageMagick to crash, resulting in a denial of service. This
issue only affected Ubuntu 22.10. (CVE-2021-3574)

It was discovered that ImageMagick did not use the correct rights when
specifically excluded by a module policy. An attacker could use this issue
to read and write certain restricted files. This issue only affected
Ubuntu 22.10. (CVE-2021-39212)

It was discovered that ImageMagick incorrectly handled certain values =
=20
when processing specially crafted SVG files. By tricking a user into =20
opening a specially crafted SVG file, an attacker could crash the =20
application causing a denial of service. This issue only affected Ubuntu =
=20
22.10. (CVE-2021-4219)

It was discovered that ImageMagick did not properly manage memory under =
=20
certain circumstances. If a user were tricked into opening a specially =
=20
crafted DICOM file, an attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service or leaking sensitive
information. This issue only affected Ubuntu 22.10. (CVE-2022-1114)

It was discovered that ImageMagick incorrectly handled memory under
certain circumstances. If a user were tricked into opening a specially
crafted image file, an attacker could possibly exploit this issue to cause
a denial of service or other unspecified impact. This issue only affected
Ubuntu 22.10. (CVE-2022-28463)

It was discovered that ImageMagick incorrectly handled certain values.
If a user were tricked into processing a specially crafted image file,
an attacker could possibly exploit this issue to cause a denial of service
or other unspecified impact. This issue only affected Ubuntu 14.04 ESM,
Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32545, CVE-2022-32546)

It was discovered that ImageMagick incorrectly handled memory under
certain circumstances. If a user were tricked into processing a specially
crafted image file, an attacker could possibly exploit this issue to cause
a denial of service or other unspecified impact. This issue only affected
Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32547)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
imagemagick 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
imagemagick-6-common 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
imagemagick-6.q16 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
imagemagick-6.q16hdri 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
imagemagick-common 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libimage-magick-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libimage-magick-q16-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagick++-6.q16-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagick++-6.q16-dev 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagick++-6.q16hdri-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagick++-dev 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-6-arch-config 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-6-headers 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-6.q16-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-6.q16-dev 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickcore-dev 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickwand-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickwand-6.q16-dev 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
libmagickwand-dev 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1
perlmagick 8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1

Ubuntu 18.04 LTS:
imagemagick 8:6.9.7.4+dfsg-16ubuntu6.14
imagemagick-6-common 8:6.9.7.4+dfsg-16ubuntu6.14
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu6.14
imagemagick-6.q16hdri 8:6.9.7.4+dfsg-16ubuntu6.14
imagemagick-common 8:6.9.7.4+dfsg-16ubuntu6.14
libimage-magick-perl 8:6.9.7.4+dfsg-16ubuntu6.14
libimage-magick-q16-perl 8:6.9.7.4+dfsg-16ubuntu6.14
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu6.14
libmagick++-6.q16-dev 8:6.9.7.4+dfsg-16ubuntu6.14
libmagick++-6.q16hdri-7 8:6.9.7.4+dfsg-16ubuntu6.14
libmagick++-dev 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-6-arch-config 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-6-headers 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-6.q16-dev 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickcore-dev 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickwand-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickwand-6.q16-dev 8:6.9.7.4+dfsg-16ubuntu6.14
libmagickwand-dev 8:6.9.7.4+dfsg-16ubuntu6.14
perlmagick 8:6.9.7.4+dfsg-16ubuntu6.14

Ubuntu 16.04 ESM:
imagemagick 8:6.8.9.9-7ubuntu5.16+esm5
imagemagick-6.q16 8:6.8.9.9-7ubuntu5.16+esm5
imagemagick-common 8:6.8.9.9-7ubuntu5.16+esm5
libimage-magick-perl 8:6.8.9.9-7ubuntu5.16+esm5
libimage-magick-q16-perl 8:6.8.9.9-7ubuntu5.16+esm5
libmagick++-6.q16-5v5 8:6.8.9.9-7ubuntu5.16+esm5
libmagick++-6.q16-dev 8:6.8.9.9-7ubuntu5.16+esm5
libmagick++-dev 8:6.8.9.9-7ubuntu5.16+esm5
libmagickcore-6-arch-config 8:6.8.9.9-7ubuntu5.16+esm5
libmagickcore-6-headers 8:6.8.9.9-7ubuntu5.16+esm5
libmagickcore-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm5
libmagickcore-6.q16-2-extra 8:6.8.9.9-7ubuntu5.16+esm5
libmagickcore-6.q16-dev 8:6.8.9.9-7ubuntu5.16+esm5
libmagickcore-dev 8:6.8.9.9-7ubuntu5.16+esm5
libmagickwand-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm5
libmagickwand-6.q16-dev 8:6.8.9.9-7ubuntu5.16+esm5
libmagickwand-dev 8:6.8.9.9-7ubuntu5.16+esm5
perlmagick 8:6.8.9.9-7ubuntu5.16+esm5

Ubuntu 14.04 ESM:
imagemagick 8:6.7.7.10-6ubuntu3.13+esm3
imagemagick-common 8:6.7.7.10-6ubuntu3.13+esm3
libmagick++-dev 8:6.7.7.10-6ubuntu3.13+esm3
libmagick++5 8:6.7.7.10-6ubuntu3.13+esm3
libmagickcore-dev 8:6.7.7.10-6ubuntu3.13+esm3
libmagickcore5 8:6.7.7.10-6ubuntu3.13+esm3
libmagickcore5-extra 8:6.7.7.10-6ubuntu3.13+esm3
libmagickwand-dev 8:6.7.7.10-6ubuntu3.13+esm3
libmagickwand5 8:6.7.7.10-6ubuntu3.13+esm3
perlmagick 8:6.7.7.10-6ubuntu3.13+esm3

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5736-1
CVE-2021-20224, CVE-2021-20241, CVE-2021-20243, CVE-2021-20244,
CVE-2021-20245, CVE-2021-20246, CVE-2021-20309, CVE-2021-20312,
CVE-2021-20313, CVE-2021-3574, CVE-2021-39212, CVE-2021-4219,
CVE-2022-1114, CVE-2022-28463, CVE-2022-32545, CVE-2022-32546,
CVE-2022-32547

Package Information:
https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.11.60+dfsg-1.3ubun=
tu0.22.10.1
https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.7.4+dfsg-16ubuntu6=
=2E14

--dkmz4epkjxggnhlf
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=FHX8
-----END PGP SIGNATURE-----

--dkmz4epkjxggnhlf--


--===============7365931600659305269==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline


--===============7365931600659305269==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung