{"id":"USN-7164-1","summary":"imagemagick vulnerability","details":"It was discovered that ImageMagick incorrectly handled certain malformed\nfiles. If a user or automated system were tricked into opening a specially\ncrafted file, an attacker could possibly exploit this to cause a denial of\nservice.\n","modified":"2026-04-27T17:17:28.920794755Z","published":"2024-12-17T11:47:09Z","related":["UBUNTU-CVE-2021-20176","UBUNTU-CVE-2021-20241","UBUNTU-CVE-2021-20243"],"upstream":["CVE-2021-20176","CVE-2021-20241","CVE-2021-20243","UBUNTU-CVE-2021-20176","UBUNTU-CVE-2021-20241","UBUNTU-CVE-2021-20243"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7164-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20176"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20241"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20243"}],"affected":[{"package":{"name":"imagemagick","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.7.7.10-6ubuntu3.13+esm12?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.7.7.10-6ubuntu3.13+esm12"}]}],"versions":["8:6.7.7.10-5ubuntu3","8:6.7.7.10-5ubuntu4","8:6.7.7.10-6ubuntu1","8:6.7.7.10-6ubuntu2","8:6.7.7.10-6ubuntu3","8:6.7.7.10-6ubuntu3.1","8:6.7.7.10-6ubuntu3.2","8:6.7.7.10-6ubuntu3.3","8:6.7.7.10-6ubuntu3.4","8:6.7.7.10-6ubuntu3.5","8:6.7.7.10-6ubuntu3.6","8:6.7.7.10-6ubuntu3.7","8:6.7.7.10-6ubuntu3.8","8:6.7.7.10-6ubuntu3.9","8:6.7.7.10-6ubuntu3.11","8:6.7.7.10-6ubuntu3.12","8:6.7.7.10-6ubuntu3.13","8:6.7.7.10-6ubuntu3.13+esm1","8:6.7.7.10-6ubuntu3.13+esm2","8:6.7.7.10-6ubuntu3.13+esm3","8:6.7.7.10-6ubuntu3.13+esm4","8:6.7.7.10-6ubuntu3.13+esm5","8:6.7.7.10-6ubuntu3.13+esm6","8:6.7.7.10-6ubuntu3.13+esm7","8:6.7.7.10-6ubuntu3.13+esm8","8:6.7.7.10-6ubuntu3.13+esm9","8:6.7.7.10-6ubuntu3.13+esm10","8:6.7.7.10-6ubuntu3.13+esm11"],"ecosystem_specific":{"binaries":[{"binary_name":"imagemagick","binary_version":"8:6.7.7.10-6ubuntu3.13+esm12"},{"binary_name":"imagemagick-common","binary_version":"8:6.7.7.10-6ubuntu3.13+esm12"},{"binary_name":"libmagick++5","binary_version":"8:6.7.7.10-6ubuntu3.13+esm12"},{"binary_name":"libmagickcore5","binary_version":"8:6.7.7.10-6ubuntu3.13+esm12"},{"binary_name":"libmagickcore5-extra","binary_version":"8:6.7.7.10-6ubuntu3.13+esm12"},{"binary_name":"libmagickwand5","binary_version":"8:6.7.7.10-6ubuntu3.13+esm12"},{"binary_name":"perlmagick","binary_version":"8:6.7.7.10-6ubuntu3.13+esm12"}],"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7164-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-20176"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-20241"}]}}}],"schema_version":"1.7.5"}