{"schema_version":"1.7.2","id":"OESA-2025-1907","modified":"2025-07-25T13:17:12Z","published":"2025-07-25T13:17:12Z","upstream":["CVE-2025-53014","CVE-2025-53015","CVE-2025-53019","CVE-2025-53101"],"summary":"ImageMagick security update","details":"Use ImageMagick to create, edit, compose, or convert bitmap images. It can read and write\nimages in a variety of formats (over 200) including PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR,\nWebP, Postscript, PDF, and SVG. Use ImageMagick to resize, flip, mirror, rotate, distort,\nshear and transform images, adjust image colors, apply various special effects,\nor draw text, lines, polygons, ellipses and Bézier curves.\r\n\r\nSecurity Fix(es):\n\nImageMagick is free and open-source software used for editing and manipulating digital images. Versions prior to 7.1.2-0 and 6.9.13-26 have a heap buffer overflow in the `InterpretImageFilename` function. The issue stems from an off-by-one error that causes out-of-bounds memory access when processing format strings containing consecutive percent signs (`%%`). Versions 7.1.2-0 and 6.9.13-26 fix the issue.(CVE-2025-53014)\n\nA vulnerability, which was classified as problematic, was found in ImageMagick up to 7.1.1 (Image Processing Software).CWE is classifying the issue as CWE-835. The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.This is going to have an impact on availability.Upgrading to version 7.1.2-0 eliminates this vulnerability.(CVE-2025-53015)\n\nImageMagick is free and open-source software used for editing and manipulating digital images. In versions prior to 7.1.2-0 and 6.9.13-26, in ImageMagick&apos;s `magick stream` command, specifying multiple consecutive `%d` format specifiers in a filename template causes a memory leak. Versions 7.1.2-0 and 6.9.13-26 fix the issue.(CVE-2025-53019)\n\nImageMagick is free and open-source software used for editing and manipulating digital images. In versions prior to 7.1.2-0 and 6.9.13-26, in ImageMagick&apos;s `magick mogrify` command, specifying multiple consecutive `%d` format specifiers in a filename template causes internal pointer arithmetic to generate an address below the beginning of the stack buffer, resulting in a stack overflow through `vsnprintf()`. Versions 7.1.2-0 and 6.9.13-26 fix the issue.(CVE-2025-53101)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"ImageMagick","purl":"pkg:rpm/openEuler/ImageMagick&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.1.1.8-7.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["ImageMagick-7.1.1.8-7.oe2203sp4.aarch64.rpm","ImageMagick-c++-7.1.1.8-7.oe2203sp4.aarch64.rpm","ImageMagick-c++-devel-7.1.1.8-7.oe2203sp4.aarch64.rpm","ImageMagick-debuginfo-7.1.1.8-7.oe2203sp4.aarch64.rpm","ImageMagick-debugsource-7.1.1.8-7.oe2203sp4.aarch64.rpm","ImageMagick-devel-7.1.1.8-7.oe2203sp4.aarch64.rpm","ImageMagick-help-7.1.1.8-7.oe2203sp4.aarch64.rpm","ImageMagick-perl-7.1.1.8-7.oe2203sp4.aarch64.rpm"],"src":["ImageMagick-7.1.1.8-7.oe2203sp4.src.rpm"],"x86_64":["ImageMagick-7.1.1.8-7.oe2203sp4.x86_64.rpm","ImageMagick-c++-7.1.1.8-7.oe2203sp4.x86_64.rpm","ImageMagick-c++-devel-7.1.1.8-7.oe2203sp4.x86_64.rpm","ImageMagick-debuginfo-7.1.1.8-7.oe2203sp4.x86_64.rpm","ImageMagick-debugsource-7.1.1.8-7.oe2203sp4.x86_64.rpm","ImageMagick-devel-7.1.1.8-7.oe2203sp4.x86_64.rpm","ImageMagick-help-7.1.1.8-7.oe2203sp4.x86_64.rpm","ImageMagick-perl-7.1.1.8-7.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1907"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-53014"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-53015"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-53019"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-53101"}],"database_specific":{"severity":"High"}}
