|
|
Subscribe / Log in / New account

Ubuntu alert USN-7068-1 (imagemagick)

From:  Chrisa Oikonomou <chrisa.oikonomou@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-7068-1] ImageMagick vulnerabilities
Date:  Tue, 15 Oct 2024 12:56:36 +0300
Message-ID:  <8bd2dbb7-bd5e-487a-b56a-e3d5e9c7fce9@canonical.com>

========================================================================== Ubuntu Security Notice USN-7068-1 October 15, 2024 imagemagick vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Several security issues were fixed in ImageMagick. Software Description: - imagemagick: Image manipulation programs and library Details: It was discovered that ImageMagick incorrectly handled certain malformed image files. If a user or automated system using ImageMagick were tricked into processing a specially crafted file, an attacker could exploit this to cause a denial of service or affect the reliability of the system. The vulnerabilities included memory leaks, buffer overflows, and improper handling of pixel data. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS   imagemagick-6.q16               8:6.8.9.9-7ubuntu5.16+esm11                                   Available with Ubuntu Pro   libimage-magick-perl            8:6.8.9.9-7ubuntu5.16+esm11                                   Available with Ubuntu Pro   libimage-magick-q16-perl        8:6.8.9.9-7ubuntu5.16+esm11                                   Available with Ubuntu Pro   libmagick++-6.q16-5v5           8:6.8.9.9-7ubuntu5.16+esm11                                   Available with Ubuntu Pro   libmagickcore-6-headers         8:6.8.9.9-7ubuntu5.16+esm11                                   Available with Ubuntu Pro   libmagickcore-6.q16-2           8:6.8.9.9-7ubuntu5.16+esm11                                   Available with Ubuntu Pro   libmagickcore-6.q16-2-extra     8:6.8.9.9-7ubuntu5.16+esm11                                   Available with Ubuntu Pro   libmagickcore-6.q16-dev         8:6.8.9.9-7ubuntu5.16+esm11                                   Available with Ubuntu Pro   libmagickwand-6.q16-2           8:6.8.9.9-7ubuntu5.16+esm11                                   Available with Ubuntu Pro Ubuntu 14.04 LTS   imagemagick                     8:6.7.7.10-6ubuntu3.13+esm11                                   Available with Ubuntu Pro   libmagick++-dev                 8:6.7.7.10-6ubuntu3.13+esm11                                   Available with Ubuntu Pro   libmagick++5                    8:6.7.7.10-6ubuntu3.13+esm11                                   Available with Ubuntu Pro   libmagickcore-dev               8:6.7.7.10-6ubuntu3.13+esm11                                   Available with Ubuntu Pro   libmagickcore5                  8:6.7.7.10-6ubuntu3.13+esm11                                   Available with Ubuntu Pro   libmagickcore5-extra            8:6.7.7.10-6ubuntu3.13+esm11                                   Available with Ubuntu Pro   libmagickwand-dev               8:6.7.7.10-6ubuntu3.13+esm11                                   Available with Ubuntu Pro   libmagickwand5                  8:6.7.7.10-6ubuntu3.13+esm11                                   Available with Ubuntu Pro   perlmagick                      8:6.7.7.10-6ubuntu3.13+esm11                                   Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7068-1 <https://ubuntu.com/security/notices/USN-7068-1>   CVE-2019-7397, CVE-2019-7398, CVE-2019-9956, CVE-2020-19667,   CVE-2020-25664, CVE-2020-25665, CVE-2020-25666, CVE-2020-25674,   CVE-2020-25676, CVE-2020-27560, CVE-2020-27750, CVE-2020-27753,   CVE-2020-27754, CVE-2020-27755, CVE-2020-27758, CVE-2020-27759,   CVE-2020-27760, CVE-2020-27761, CVE-2020-27762, CVE-2020-27763,   CVE-2020-27764, CVE-2020-27765, CVE-2020-27766, CVE-2020-27767,   CVE-2020-27768, CVE-2020-27769, CVE-2020-27770, CVE-2020-27771,   CVE-2020-27772, CVE-2020-27773, CVE-2020-27774, CVE-2020-27775,   CVE-2020-27776


Attachment: None (type=text/html)

(HTML attachment elided)


Attachment: OpenPGP_signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- wsD5BAABCAAjFiEE26yozGlLvY8PLmS9C+du+fOjiEwFAmcOPFQFAwAAAAAACgkQC+du+fOjiExn 5Qv/YkzfToyAq3Uc3vy4XuDNIxt0+QjWQ4TY4//Gxr8K4TwAt6E5yhIcaKxAC8rtPHVfEaV62MlX ifxU5y3UerkMup/3cQmy2DadG5jZ+9+sXPo7IFF3teWtVlHmrfDlr8ri07B3Yh0i+bEIzWo//p0P 25BYuDzem8keunzpXdIfYCH1ALy0OMCVe9wbqxWEYMhXt3MJB1Yhc89CYYau6X0+jNTXE2yr8Psc 1m8kbYVC8Wpaz53CdZ237erg/6WwqQ1kU5bYst9DQIKyEUo3A4euxAnY5UxIlEJFBwDr7MB1tyN5 p/aKwR74WEkHQbHkTbNnf4IThv4VkQrzf5nYc2a0LngPOW6Qhy09eD13UIW6ovtPfDaNpFr6DU5v jnbeR4f3X/VfRrgAVBmz2KGHFyj7h4tU00WLSTwFrMmWGKRI7JRtjfXEU5OzAkNM1h6HaDOqsYjU Shd6UWmUJ8d+pbkXsTp2UQfyqk2DTjIZVmiOKeiZnWBTw7+N/MmaLAqlVobn =VJEy -----END PGP SIGNATURE-----


Attachment: None (type=text/plain)


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds