USN-4034-1: ImageMagick vulnerabilities
25 June 2019
Several security issues were fixed in ImageMagick.
Releases
Packages
- imagemagick - Image manipulation programs and library
Details
It was discovered that ImageMagick incorrectly handled certain malformed
image files. If a user or automated system using ImageMagick were tricked
into opening a specially crafted image, an attacker could exploit this to
cause a denial of service or possibly execute code with the privileges of
the user invoking the program.
Due to a large number of issues discovered in GhostScript that prevent it
from being used by ImageMagick safely, the update for Ubuntu 18.10 and
Ubuntu 19.04 includes a default policy change that disables support for the
Postscript and PDF formats in ImageMagick. This policy can be overridden if
necessary by using an alternate ImageMagick policy configuration.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04
-
imagemagick
-
8:6.9.10.14+dfsg-7ubuntu2.2
-
imagemagick-6.q16
-
8:6.9.10.14+dfsg-7ubuntu2.2
-
libmagick++-6.q16-8
-
8:6.9.10.14+dfsg-7ubuntu2.2
-
libmagickcore-6.q16-6
-
8:6.9.10.14+dfsg-7ubuntu2.2
-
libmagickcore-6.q16-6-extra
-
8:6.9.10.14+dfsg-7ubuntu2.2
Ubuntu 18.10
-
imagemagick
-
8:6.9.10.8+dfsg-1ubuntu2.2
-
imagemagick-6.q16
-
8:6.9.10.8+dfsg-1ubuntu2.2
-
libmagick++-6.q16-8
-
8:6.9.10.8+dfsg-1ubuntu2.2
-
libmagickcore-6.q16-6
-
8:6.9.10.8+dfsg-1ubuntu2.2
-
libmagickcore-6.q16-6-extra
-
8:6.9.10.8+dfsg-1ubuntu2.2
Ubuntu 18.04
-
imagemagick
-
8:6.9.7.4+dfsg-16ubuntu6.7
-
imagemagick-6.q16
-
8:6.9.7.4+dfsg-16ubuntu6.7
-
libmagick++-6.q16-7
-
8:6.9.7.4+dfsg-16ubuntu6.7
-
libmagickcore-6.q16-3
-
8:6.9.7.4+dfsg-16ubuntu6.7
-
libmagickcore-6.q16-3-extra
-
8:6.9.7.4+dfsg-16ubuntu6.7
Ubuntu 16.04
-
imagemagick
-
8:6.8.9.9-7ubuntu5.14
-
imagemagick-6.q16
-
8:6.8.9.9-7ubuntu5.14
-
libmagick++-6.q16-5v5
-
8:6.8.9.9-7ubuntu5.14
-
libmagickcore-6.q16-2
-
8:6.8.9.9-7ubuntu5.14
-
libmagickcore-6.q16-2-extra
-
8:6.8.9.9-7ubuntu5.14
In general, a standard system update will make all the necessary changes.
References
- CVE-2017-12805
- CVE-2017-12806
- CVE-2018-14434
- CVE-2018-15607
- CVE-2018-16323
- CVE-2018-16412
- CVE-2018-16413
- CVE-2018-16644
- CVE-2018-16645
- CVE-2018-17965
- CVE-2018-17966
- CVE-2018-18016
- CVE-2018-18023
- CVE-2018-18024
- CVE-2018-18025
- CVE-2018-18544
- CVE-2018-20467
- CVE-2019-10131
- CVE-2019-10649
- CVE-2019-10650
- CVE-2019-11470
- CVE-2019-11472
- CVE-2019-11597
- CVE-2019-11598
- CVE-2019-7175
- CVE-2019-7395
- CVE-2019-7396
- CVE-2019-7397
- CVE-2019-7398
- CVE-2019-9956