USN-6393-1: ImageMagick vulnerability
Severity
Low
Vendor
VMware Tanzu
Versions Affected
- Canonical Ubuntu 18.04
Description
It was discovered that ImageMagick did not properly handle memory when processing the -help option. An attacker could potentially use this issue to cause a crash. Update Instructions: Run `sudo pro fix USN-6393-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmagick++-6.q16hdri-dev - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickcore-6.q16-6-extra - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickwand-dev - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 imagemagick-6.q16 - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickcore-6-headers - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 imagemagick-6-common - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickwand-6.q16-6 - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickcore-6.q16hdri-6-extra - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagick++-6-headers - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libimage-magick-q16-perl - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libimage-magick-perl - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagick++-dev - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 perlmagick - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagick++-6.q16hdri-8 - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 imagemagick - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickwand-6.q16hdri-dev - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickwand-6.q16-dev - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickcore-6.q16-6 - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickcore-6.q16hdri-dev - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagick++-6.q16-dev - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 imagemagick-common - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickcore-6.q16-dev - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 imagemagick-doc - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickwand-6-headers - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 imagemagick-6-doc - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickcore-6.q16hdri-6 - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libimage-magick-q16hdri-perl - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickcore-6-arch-config - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 imagemagick-6.q16hdri - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickcore-dev - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagick++-6.q16-8 - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 libmagickwand-6.q16hdri-6 - 8:6.9.10.23+dfsg-2.1ubuntu11.9+esm1 Available with Ubuntu Pro: https://ubuntu.com/pro
CVEs contained in this USN include: CVE-2022-48541
Affected VMware Products and Versions
Severity is low unless otherwise noted.
-
Isolation Segment
- 2.11.x versions prior to 2.11.40
- 2.13.x versions prior to 2.13.25
- 3.0.x versions prior to 3.0.18
- 4.0.x versions prior to 4.0.10+LTS-T
-
VMware Tanzu Application Service for VMs
- 2.11.x versions prior to 2.11.46
- 2.13.x versions prior to 2.13.28
- 3.0.x versions prior to 3.0.18
- 4.0.x versions prior to 4.0.10+LTS-T
Mitigation
Users of affected products are strongly encouraged to follow the mitigation below. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:
-
Isolation Segment
- 2.11.40
- 2.13.25
- 3.0.18
- 4.0.10+LTS-T
-
VMware Tanzu Application Service for VMs
- 2.11.46
- 2.13.28
- 3.0.18
- 4.0.10+LTS-T
References
History
2023-10-18: Initial vulnerability report published.