7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
32.3%
usn-5456-1
Medium
Canonical Ubuntu
It was discovered that ImageMagick incorrectly handled memory under certain circumstances. If a user were tricked into opening a specially crafted image, an attacker could possibly exploit this issue to cause a denial of service or other unspecified impact. Update Instructions: Run sudo ua fix USN-5456-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libmagick+±6.q16hdri-dev – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickwand-dev – 8:6.9.7.4+dfsg-16ubuntu6.13 imagemagick-6.q16 – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickcore-6-headers – 8:6.9.7.4+dfsg-16ubuntu6.13 imagemagick-6-common – 8:6.9.7.4+dfsg-16ubuntu6.13 imagemagick – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickcore-6.q16-3-extra – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagick+±6-headers – 8:6.9.7.4+dfsg-16ubuntu6.13 libimage-magick-q16-perl – 8:6.9.7.4+dfsg-16ubuntu6.13 libimage-magick-perl – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagick+±dev – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickwand-6.q16-3 – 8:6.9.7.4+dfsg-16ubuntu6.13 perlmagick – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickcore-6.q16hdri-3-extra – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagick+±6.q16hdri-7 – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickwand-6.q16hdri-dev – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickwand-6.q16-dev – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickcore-6.q16-3 – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickcore-6.q16hdri-dev – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagick+±6.q16-dev – 8:6.9.7.4+dfsg-16ubuntu6.13 imagemagick-6.q16hdri – 8:6.9.7.4+dfsg-16ubuntu6.13 imagemagick-common – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickcore-6.q16-dev – 8:6.9.7.4+dfsg-16ubuntu6.13 imagemagick-doc – 8:6.9.7.4+dfsg-16ubuntu6.13 imagemagick-6-doc – 8:6.9.7.4+dfsg-16ubuntu6.13 libimage-magick-q16hdri-perl – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagick+±6.q16-7 – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickcore-6.q16hdri-3 – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickcore-6-arch-config – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickwand-6.q16hdri-3 – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickcore-dev – 8:6.9.7.4+dfsg-16ubuntu6.13 libmagickwand-6-headers – 8:6.9.7.4+dfsg-16ubuntu6.13 No subscription required
CVEs contained in this USN include: CVE-2022-28463.
Severity is medium unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below.
The Cloud Foundry project recommends upgrading the following releases:
2022-07-28: Initial vulnerability report published.
CPE | Name | Operator | Version |
---|---|---|---|
cflinuxfs3 | lt | 0.302.0 | |
cf deployment | lt | 21.4.0 |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
32.3%