CVE-2025-53101

NameCVE-2025-53101
DescriptionImageMagick is free and open-source software used for editing and manipulating digital images. In versions prior to 7.1.2-0 and 6.9.13-26, in ImageMagick's `magick mogrify` command, specifying multiple consecutive `%d` format specifiers in a filename template causes internal pointer arithmetic to generate an address below the beginning of the stack buffer, resulting in a stack overflow through `vsnprintf()`. Versions 7.1.2-0 and 6.9.13-26 fix the issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-4297-1
Debian Bugs1109339

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
imagemagick (PTS)bullseye8:6.9.11.60+dfsg-1.3+deb11u4vulnerable
bullseye (security)8:6.9.11.60+dfsg-1.3+deb11u6fixed
bookworm8:6.9.11.60+dfsg-1.6+deb12u3vulnerable
bookworm (security)8:6.9.11.60+dfsg-1.6+deb12u4vulnerable
trixie8:7.1.1.43+dfsg1-1+deb13u1fixed
trixie (security)8:7.1.1.43+dfsg1-1+deb13u2fixed
forky, sid8:7.1.2.3+dfsg1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
imagemagicksourcebullseye8:6.9.11.60+dfsg-1.3+deb11u6DLA-4297-1
imagemagicksourcetrixie8:7.1.1.43+dfsg1-1+deb13u1
imagemagicksource(unstable)8:7.1.1.47+dfsg1-21109339

Notes

[bookworm] - imagemagick <no-dsa> (Minor issue)
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qh3h-j545-h8c9
https://github.com/ImageMagick/ImageMagick/commit/66dc8f51c11b0ae1f1cdeacd381c3e9a4de69774 (7.1.2-0)
https://github.com/ImageMagick/ImageMagick6/commit/643deeb60803488373cd4799b24d5786af90972e (6.9.13-26)

Search for package or bug name: Reporting problems