[USN-3681-1] ImageMagick vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============9072712095411478984==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”BheQay7f5QIVguHu6GyqEgUMbNciBktcP”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–BheQay7f5QIVguHu6GyqEgUMbNciBktcP
Content-Type: multipart/mixed; boundary=”KISjqGeuDF41joaHzMHv1WdcTg3RqV4X4″;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3681-1] ImageMagick vulnerabilities

–KISjqGeuDF41joaHzMHv1WdcTg3RqV4X4
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3681-1
June 12, 2018

imagemagick vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in ImageMagick.

Software Description:
– imagemagick: Image manipulation programs and library

Details:

It was discovered that ImageMagick incorrectly handled certain malformed
image files. If a user or automated system using ImageMagick were tricked=

into opening a specially crafted image, an attacker could exploit this to=

cause a denial of service or possibly execute code with the privileges of=

the user invoking the program.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
imagemagick 8:6.9.7.4+dfsg-16ubuntu6.2
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu6.2
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu6.2
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.2
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu6.2

Ubuntu 17.10:
imagemagick 8:6.9.7.4+dfsg-16ubuntu2.2
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu2.2
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu2.2
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu2.2
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu2.2

Ubuntu 16.04 LTS:
imagemagick 8:6.8.9.9-7ubuntu5.11
imagemagick-6.q16 8:6.8.9.9-7ubuntu5.11
libmagick++-6.q16-5v5 8:6.8.9.9-7ubuntu5.11
libmagickcore-6.q16-2 8:6.8.9.9-7ubuntu5.11
libmagickcore-6.q16-2-extra 8:6.8.9.9-7ubuntu5.11

Ubuntu 14.04 LTS:
imagemagick 8:6.7.7.10-6ubuntu3.11
libmagick++5 8:6.7.7.10-6ubuntu3.11
libmagickcore5 8:6.7.7.10-6ubuntu3.11
libmagickcore5-extra 8:6.7.7.10-6ubuntu3.11

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3681-1
CVE-2017-1000445, CVE-2017-1000476, CVE-2017-10995, CVE-2017-11352,
CVE-2017-11533, CVE-2017-11535, CVE-2017-11537, CVE-2017-11639,
CVE-2017-11640, CVE-2017-12140, CVE-2017-12418, CVE-2017-12429,
CVE-2017-12430, CVE-2017-12431, CVE-2017-12432, CVE-2017-12433,
CVE-2017-12435, CVE-2017-12563, CVE-2017-12587, CVE-2017-12640,
CVE-2017-12643, CVE-2017-12644, CVE-2017-12670, CVE-2017-12674,
CVE-2017-12691, CVE-2017-12692, CVE-2017-12693, CVE-2017-12875,
CVE-2017-12877, CVE-2017-12983, CVE-2017-13058, CVE-2017-13059,
CVE-2017-13060, CVE-2017-13061, CVE-2017-13062, CVE-2017-13131,
CVE-2017-13134, CVE-2017-13139, CVE-2017-13142, CVE-2017-13143,
CVE-2017-13144, CVE-2017-13145, CVE-2017-13758, CVE-2017-13768,
CVE-2017-13769, CVE-2017-14060, CVE-2017-14172, CVE-2017-14173,
CVE-2017-14174, CVE-2017-14175, CVE-2017-14224, CVE-2017-14249,
CVE-2017-14325, CVE-2017-14326, CVE-2017-14341, CVE-2017-14342,
CVE-2017-14343, CVE-2017-14400, CVE-2017-14505, CVE-2017-14531,
CVE-2017-14532, CVE-2017-14533, CVE-2017-14607, CVE-2017-14624,
CVE-2017-14625, CVE-2017-14626, CVE-2017-14682, CVE-2017-14684,
CVE-2017-14739, CVE-2017-14741, CVE-2017-14989, CVE-2017-15015,
CVE-2017-15016, CVE-2017-15017, CVE-2017-15032, CVE-2017-15033,
CVE-2017-15217, CVE-2017-15218, CVE-2017-15277, CVE-2017-15281,
CVE-2017-16546, CVE-2017-17499, CVE-2017-17504, CVE-2017-17680,
CVE-2017-17681, CVE-2017-17682, CVE-2017-17879, CVE-2017-17881,
CVE-2017-17882, CVE-2017-17884, CVE-2017-17885, CVE-2017-17886,
CVE-2017-17887, CVE-2017-17914, CVE-2017-17934, CVE-2017-18008,
CVE-2017-18022, CVE-2017-18027, CVE-2017-18028, CVE-2017-18029,
CVE-2017-18209, CVE-2017-18211, CVE-2017-18251, CVE-2017-18252,
CVE-2017-18254, CVE-2017-18271, CVE-2017-18273, CVE-2018-10177,
CVE-2018-10804, CVE-2018-10805, CVE-2018-11251, CVE-2018-11625,
CVE-2018-11655, CVE-2018-11656, CVE-2018-5246, CVE-2018-5247,
CVE-2018-5248, CVE-2018-5357, CVE-2018-5358, CVE-2018-6405,
CVE-2018-7443, CVE-2018-8804, CVE-2018-8960, CVE-2018-9133

Package Information:
https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.7.4+dfsg-16ubunt=
u6.2
https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.7.4+dfsg-16ubunt=
u2.2
https://launchpad.net/ubuntu/+source/imagemagick/8:6.8.9.9-7ubuntu5.11
https://launchpad.net/ubuntu/+source/imagemagick/8:6.7.7.10-6ubuntu3.11=

–KISjqGeuDF41joaHzMHv1WdcTg3RqV4X4–

–BheQay7f5QIVguHu6GyqEgUMbNciBktcP
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAlsfvREACgkQZWnYVadE
vpMBqA//U9EoHQDH/U8ZeREI6SAkHItygYFsoLagwc6XCvBJJT2AvJMcZZ6OPls4
FtrXq5OFU2TBfaWsS9HaWRPJMaoy5OdOK7xlwOSdhRY6b4AVY2JiGktf7dhJenjY
XHOZ0mUUG6daOFVaL51aj8r7D4hHn3psMVpQxguasyKPX5EaD0iojQFUhQDbtPsJ
vpWF9id8vCk1zWQ1Ox2m/TgRh8fmji/Vlu6g1BkUtXOraBJgGjmeAgSqSU7X8whW
wsUz60t2bvL49QzHexaWXOse8OYhyQnxei+AScqsySnmwqsdnz0RJFfh5VcnwTrh
LvxXRJx+QnW6hrBo0MkLnTMuhAb3ZkGNSQRR4KmB3NoG1l3Bkm/WEqZft6RsrecW
5gtwKgh/iu9uvTSg7T7Tn6jSuxD1r+i1B1eDksoMFpsI8ODn4rE166cKijN3le/I
ENa1cDPriiX2diwA9ZZsIGjl0Y2QutELwfApojhmheRFOapypa4MewKvbIwYd70O
KNMkFkIRKZUvgfZRGCg0vH5oAbGVABJqz4nLpwFJOrvagDby0lh4quf8lWjo9YL9
U/bQuYyr4oq7WdkUMUbbuN90gMAYm+A9MSqRyQhRgTkcffRm6tGJTsHxf46wMwa/
ub6XYEBfkkZDGZteq4U3bI+o50PKbK+dXWRa3t0l0cE7d0Y6AQw=
=NIit
—–END PGP SIGNATURE—–

–BheQay7f5QIVguHu6GyqEgUMbNciBktcP–

–===============9072712095411478984==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============9072712095411478984==–