Tuesday, December 17, 2024

[USN-7164-1] ImageMagick vulnerability

-----BEGIN PGP SIGNATURE-----
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=bHoq
-----END PGP SIGNATURE-----

==========================================================================
Ubuntu Security Notice USN-7164-1
December 17, 2024

imagemagick vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

ImageMagick could be made to crash if it received specially crafted
input.

Software Description:
- imagemagick: Image manipulation programs and library

Details:

It was discovered that ImageMagick incorrectly handled certain malformed
files. If a user or automated system were tricked into opening a specially
crafted file, an attacker could possibly exploit this to cause a denial of
service.


Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS
  imagemagick                     8:6.7.7.10-6ubuntu3.13+esm12
                                  Available with Ubuntu Pro
  imagemagick-common              8:6.7.7.10-6ubuntu3.13+esm12
                                  Available with Ubuntu Pro
  libmagick++-dev                 8:6.7.7.10-6ubuntu3.13+esm12
                                  Available with Ubuntu Pro
  libmagick++5                    8:6.7.7.10-6ubuntu3.13+esm12
                                  Available with Ubuntu Pro
  libmagickcore-dev               8:6.7.7.10-6ubuntu3.13+esm12
                                  Available with Ubuntu Pro
  libmagickcore5                  8:6.7.7.10-6ubuntu3.13+esm12
                                  Available with Ubuntu Pro
  libmagickcore5-extra            8:6.7.7.10-6ubuntu3.13+esm12
                                  Available with Ubuntu Pro
  libmagickwand-dev               8:6.7.7.10-6ubuntu3.13+esm12
                                  Available with Ubuntu Pro
  libmagickwand5                  8:6.7.7.10-6ubuntu3.13+esm12
                                  Available with Ubuntu Pro
  perlmagick                      8:6.7.7.10-6ubuntu3.13+esm12
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7164-1
  CVE-2021-20176, CVE-2021-20241, CVE-2021-20243

No comments:

Post a Comment