ImageMagick-6.9.10.68-7.0.7.el7.AXS7
エラータID: AXSA:2025-11533:04
ImageMagick is an image display and manipulation tool for the X
Window System. ImageMagick can read and write JPEG, TIFF, PNM, GIF,
and Photo CD image formats. It can resize, rotate, sharpen, color
reduce, or add special effects to an image, and when finished you can
either save the completed work in the original format or a different
one. ImageMagick also includes command line programs for creating
animated or transparent .gifs, creating composite images, creating
thumbnail images, and more.
ImageMagick is one of your choices if you need a program to manipulate
and display images. If you want to develop your own applications
which use ImageMagick code or APIs, you need to install
ImageMagick-devel as well.
Security Fix(es):
* CVE-2025-62171: add overflow check before calculating extent in the BMP
decoder
CVE(s):
CVE-2025-62171
ImageMagick is an open source software suite for displaying, converting, and editing raster image files. In ImageMagick versions prior to 7.1.2-7 and 6.9.13-32, an integer overflow vulnerability exists in the BMP decoder on 32-bit systems. The vulnerability occurs in coders/bmp.c when calculating the extent value by multiplying image columns by bits per pixel. On 32-bit systems with size_t of 4 bytes, a malicious BMP file with specific dimensions can cause this multiplication to overflow and wrap to zero. The overflow check added to address CVE-2025-57803 is placed after the overflow occurs, making it ineffective. A specially crafted 58-byte BMP file with width set to 536,870,912 and 32 bits per pixel can trigger this overflow, causing the bytes_per_line calculation to become zero. This vulnerability only affects 32-bit builds of ImageMagick where default resource limits for width, height, and area have been manually increased beyond their defaults. 64-bit systems with size_t of 8 bytes are not vulnerable, and systems using default ImageMagick resource limits are not vulnerable. The vulnerability is fixed in versions 7.1.2-7 and 6.9.13-32.
Update packages.
ImageMagick is an open source software suite for displaying, converting, and editing raster image files. In ImageMagick versions prior to 7.1.2-7 and 6.9.13-32, an integer overflow vulnerability exists in the BMP decoder on 32-bit systems. The vulnerability occurs in coders/bmp.c when calculating the extent value by multiplying image columns by bits per pixel. On 32-bit systems with size_t of 4 bytes, a malicious BMP file with specific dimensions can cause this multiplication to overflow and wrap to zero. The overflow check added to address CVE-2025-57803 is placed after the overflow occurs, making it ineffective. A specially crafted 58-byte BMP file with width set to 536,870,912 and 32 bits per pixel can trigger this overflow, causing the bytes_per_line calculation to become zero. This vulnerability only affects 32-bit builds of ImageMagick where default resource limits for width, height, and area have been manually increased beyond their defaults. 64-bit systems with size_t of 8 bytes are not vulnerable, and systems using default ImageMagick resource limits are not vulnerable. The vulnerability is fixed in versions 7.1.2-7 and 6.9.13-32.
N/A
Asianux Server 7 for x86_64
- ImageMagick-6.9.10.68-7.0.7.el7.AXS7.i686.rpm
MD5: d789eb6a497ba644e04c2b1ef16d5d76
SHA-256: 5b926681d962f5d8e569afcadf7d2467952ca33d55df72233d9e451588ebf06e
Size: 2.29 MB - ImageMagick-6.9.10.68-7.0.7.el7.AXS7.x86_64.rpm
MD5: 4e579415712b58f04a6a52ebf6b4a6e5
SHA-256: 744b9b7fe66abfb471ef2d8f330894adc5d1fb1189e2f6a866b8a1c4fc290fda
Size: 2.34 MB - ImageMagick-c++-6.9.10.68-7.0.7.el7.AXS7.i686.rpm
MD5: 89b7b34be607f5dbb7a3d65e23747215
SHA-256: 705ac488211d4c24e923e4edcb0a8a8efc88bd3c7d09fcbb6c97d31837bd2e39
Size: 177.74 kB - ImageMagick-c++-6.9.10.68-7.0.7.el7.AXS7.x86_64.rpm
MD5: f80c41c66845ecea7cdf6c321931a8f0
SHA-256: c582e64bd1a686604565debce4f9286cdb8470c7af7090fc04c5dda174cc62b7
Size: 169.17 kB - ImageMagick-perl-6.9.10.68-7.0.7.el7.AXS7.x86_64.rpm
MD5: c3387b933b0fbbf4ff0c1b7324a89903
SHA-256: 9c2b5158377eaf7e252c387960a40df3a36f56149f2b15e7e33ed322bdfee977
Size: 154.99 kB