ImageMagick-6.9.10.68-7.0.7.el7.AXS7
エラータID: AXSA:2025-11533:04
リリース日:
2025/12/16 Tuesday - 16:20
題名:
ImageMagick-6.9.10.68-7.0.7.el7.AXS7
影響のあるチャネル:
Asianux Server 7 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- ImageMagick には、整数オーバーフロー、およびメモリ領域の範囲外
書き込みの問題があるため、リモートの攻撃者により、サービス拒否攻撃
を可能とする脆弱性が存在します。(CVE-2025-62171)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2025-62171
ImageMagick is an open source software suite for displaying, converting, and editing raster image files. In ImageMagick versions prior to 7.1.2-7 and 6.9.13-32, an integer overflow vulnerability exists in the BMP decoder on 32-bit systems. The vulnerability occurs in coders/bmp.c when calculating the extent value by multiplying image columns by bits per pixel. On 32-bit systems with size_t of 4 bytes, a malicious BMP file with specific dimensions can cause this multiplication to overflow and wrap to zero. The overflow check added to address CVE-2025-57803 is placed after the overflow occurs, making it ineffective. A specially crafted 58-byte BMP file with width set to 536,870,912 and 32 bits per pixel can trigger this overflow, causing the bytes_per_line calculation to become zero. This vulnerability only affects 32-bit builds of ImageMagick where default resource limits for width, height, and area have been manually increased beyond their defaults. 64-bit systems with size_t of 8 bytes are not vulnerable, and systems using default ImageMagick resource limits are not vulnerable. The vulnerability is fixed in versions 7.1.2-7 and 6.9.13-32.
ImageMagick is an open source software suite for displaying, converting, and editing raster image files. In ImageMagick versions prior to 7.1.2-7 and 6.9.13-32, an integer overflow vulnerability exists in the BMP decoder on 32-bit systems. The vulnerability occurs in coders/bmp.c when calculating the extent value by multiplying image columns by bits per pixel. On 32-bit systems with size_t of 4 bytes, a malicious BMP file with specific dimensions can cause this multiplication to overflow and wrap to zero. The overflow check added to address CVE-2025-57803 is placed after the overflow occurs, making it ineffective. A specially crafted 58-byte BMP file with width set to 536,870,912 and 32 bits per pixel can trigger this overflow, causing the bytes_per_line calculation to become zero. This vulnerability only affects 32-bit builds of ImageMagick where default resource limits for width, height, and area have been manually increased beyond their defaults. 64-bit systems with size_t of 8 bytes are not vulnerable, and systems using default ImageMagick resource limits are not vulnerable. The vulnerability is fixed in versions 7.1.2-7 and 6.9.13-32.
追加情報:
N/A
ダウンロード:
Asianux Server 7 for x86_64
- ImageMagick-6.9.10.68-7.0.7.el7.AXS7.i686.rpm
MD5: d789eb6a497ba644e04c2b1ef16d5d76
SHA-256: 5b926681d962f5d8e569afcadf7d2467952ca33d55df72233d9e451588ebf06e
Size: 2.29 MB - ImageMagick-6.9.10.68-7.0.7.el7.AXS7.x86_64.rpm
MD5: 4e579415712b58f04a6a52ebf6b4a6e5
SHA-256: 744b9b7fe66abfb471ef2d8f330894adc5d1fb1189e2f6a866b8a1c4fc290fda
Size: 2.34 MB - ImageMagick-c++-6.9.10.68-7.0.7.el7.AXS7.i686.rpm
MD5: 89b7b34be607f5dbb7a3d65e23747215
SHA-256: 705ac488211d4c24e923e4edcb0a8a8efc88bd3c7d09fcbb6c97d31837bd2e39
Size: 177.74 kB - ImageMagick-c++-6.9.10.68-7.0.7.el7.AXS7.x86_64.rpm
MD5: f80c41c66845ecea7cdf6c321931a8f0
SHA-256: c582e64bd1a686604565debce4f9286cdb8470c7af7090fc04c5dda174cc62b7
Size: 169.17 kB - ImageMagick-perl-6.9.10.68-7.0.7.el7.AXS7.x86_64.rpm
MD5: c3387b933b0fbbf4ff0c1b7324a89903
SHA-256: 9c2b5158377eaf7e252c387960a40df3a36f56149f2b15e7e33ed322bdfee977
Size: 154.99 kB