Описание
Security update for ImageMagick
This update for ImageMagick fixes the following issues:
- CVE-2025-65955: possible use-after-free/double-free in
Options::fontFamilywhen clearing a family can lead to crashes or memory corruption (bsc#1254435). - CVE-2025-66628: possible integer overflow in the TIM image parser's
ReadTIMImagefunction can lead to arbitrary memory disclosure on 32-bit systems (bsc#1254820).
Список пакетов
SUSE Linux Enterprise Server 15 SP6-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP6
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2026:0011-1
- E-Mail link for SUSE-SU-2026:0011-1
- SUSE Security Ratings
- SUSE Bug 1254435
- SUSE Bug 1254820
- SUSE CVE CVE-2025-65955 page
- SUSE CVE CVE-2025-66628 page
Описание
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick's Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
Затронутые продукты
Ссылки
- CVE-2025-65955
- SUSE Bug 1254435
Описание
ImageMagick is a software suite to create, edit, compose, or convert bitmap images. In versions 7.1.2-9 and prior, the TIM (PSX TIM) image parser contains a critical integer overflow vulnerability in its ReadTIMImage function (coders/tim.c). The code reads width and height (16-bit values) from the file header and calculates image_size = 2 * width * height without checking for overflow. On 32-bit systems (or where size_t is 32-bit), this calculation can overflow if width and height are large (e.g., 65535), wrapping around to a small value. This results in a small heap allocation via AcquireQuantumMemory and later operations relying on the dimensions can trigger an out of bounds read. This issue is fixed in version 7.1.2-10.
Затронутые продукты
Ссылки
- CVE-2025-66628
- SUSE Bug 1254820