Debian Patches

Status for imagemagick/8:6.9.11.60+dfsg-1.6+deb12u8

Patch Description Author Forwarded Bugs Origin Last update
CVE-2026-25988.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-782x-jh29-9mf7

sometimes msl.c fails to update the stack index, so an image is stored in the wrong slot and never freed on error, causing leaks

(cherry picked from commit d2e99064d65f5955f39d92e4b208089409118683)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/d2e99064d65f5955f39d92e4b208089409118683 2026-02-07
CVE-2026-25989_pre1.patch optimize cast methods
(cherry picked from commit 638ef47e90fe7de9717cf96018a271bf256ad080)
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/638ef47e90fe7de9717cf96018a271bf256ad080 2025-10-18
CVE-2026-25989_pre2.patch https://github.com/ImageMagick/ImageMagick/issues/8556
(cherry picked from commit 370cdbdfd5ede94c2136d4cf20fe1aab21e38388)
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/370cdbdfd5ede94c2136d4cf20fe1aab21e38388 2026-02-04
CVE-2026-25989.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-7355-pwx2-pm84

(cherry picked from commit 7fc7208f8f3073d768b8b1658fd6ecda1ef6e1c5)
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/7fc7208f8f3073d768b8b1658fd6ecda1ef6e1c5 2026-02-07
CVE-2026-26066.patch Fixed possible infinite loop (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-v994-63cg-9wj3)

(cherry picked from commit c20c915e2fea200b6210b4759a6f83bba077ed78)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/c20c915e2fea200b6210b4759a6f83bba077ed78 2026-02-12
CVE-2026-32259.patch Added extra check to prevent out of bounds write when color reduction fails
(https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-49hx-7656-jpg3)

(cherry picked from commit 812ff3ef91967d367aa7a087a31b94f3b2a267ee)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/812ff3ef91967d367aa7a087a31b94f3b2a267ee 2026-03-07
GetMagickThreadFilename.patch Add GetMagickThreadFilename
Extract GetMagickThreadFilename from 6.9.13-41
Bastien Roucariès <rouca@debian.org> no 2026-03-17
port-msl-svg-to-6.9.13-41.patch port coders/msl.c coders/svg.c to 6.9.13-41 Bastien Roucariès <rouca@debian.org> no 2026-03-17
revert-delegate-change.patch Revert "No longer redirect the output with inkscape because this causes issues on Windows."

This reverts commit 08178d7e2dbdd4069b1b261c454afd09e37cdd4b.

[backport]
- this fix a regression on i386
Bastien Roucariès <rouca@debian.org> no 2026-04-12
i386-fix.patch Fix failure to convert for i386 Bastien Roucariès <rouca@debian.org> invalid 2026-03-31
CVE-2026-32636.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-354p-2qx7-jg9g

(cherry picked from commit a04a9a514c70c9533ccb9f6ff80102a1b9a6445b)

The NewXMLTree method contains a bug that could result in a crash due to an out of write bounds of a single zero byte
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/a04a9a514c70c9533ccb9f6ff80102a1b9a6445b 2026-03-12
CVE-2026-33535.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-mw3m-pqr2-qv7c

(cherry picked from commit 3bdfa6a73a6c0ba5f2d0986cd2a1892c37f796f3)
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/3bdfa6a73a6c0ba5f2d0986cd2a1892c37f796f3 2026-03-21
CVE-2026-33536.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-8793-7xv6-82cf

(cherry picked from commit 3ed2120f70ee9ff0c6cac2375e5821c52c381b4c)
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/3ed2120f70ee9ff0c6cac2375e5821c52c381b4c 2026-03-20
CVE-2026-26283.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-gwr3-x37h-h84v

a `continue` statement in the JPEG extent binary search loop in the jpeg encoder causes an infinite loop when writing persistently fails. An attacker can trigger a 100% CPU consumption and process hang (Denial of Service) with a crafted image.

(cherry picked from commit 8b47529f22404853d22205583087add01ea9fae8)
Cristy <urban-warrior@imagemagick.org> yes upstream backport, https://github.com/ImageMagick/ImageMagick6/commit/8b47529f22404853d22205583087add01ea9fae8 2026-02-13
CVE-2026-27798.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qpgx-jfcq-r59f

a heap buffer over-read vulnerability occurs when processing an image with small dimension using the `-wavelet-denoise` operator
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/59edeec2b2adf2ca37454d622f3bca2a61893146 2026-02-17
CVE-2026-27799.patch Corrected type to avoid an overflow (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-r99p-5442-q2x2)

(cherry picked from commit 958ca384aa84ca48fbe3af07bb8d1708ab4d6143)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/958ca384aa84ca48fbe3af07bb8d1708ab4d6143 2026-02-10
CVE-2026-25985.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-v7g2-m8c5-mf84

a crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory, leading to an out-of-memory abort.

(cherry picked from commit d186398f2c2f06692dc18eaf781042368c6659a5)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/d186398f2c2f06692dc18eaf781042368c6659a5 2026-02-07
CVE-2026-25985_post1.patch Set status to false to make sure the rest of the content is no longer parsed.

(cherry picked from commit f089279cf9cb5bbc0532078aa3aaf7d7625307d1)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/f089279cf9cb5bbc0532078aa3aaf7d7625307d1 2026-03-06
CVE-2026-26284_pre1.patch More changes to improve the readability.
(cherry picked from commit 621b8d831aa2922c6237cde35f86df78807494dc)
Dirk Lemstra <dirk@lemstra.org> no https://github.com/ImageMagick/ImageMagick6/commit/621b8d831aa2922c6237cde35f86df78807494dc 2026-01-27
CVE-2026-26284.patch Corrected loop initialization to prevent out of bounds read (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-wrhr-rf8j-r842)

(cherry picked from commit 5204a166fd2463905025378303c7e3715163d0e7)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/5204a166fd2463905025378303c7e3715163d0e7 2026-01-27
CVE-2026-26983.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-w8mw-frc6-r7m8

The MSL interpreter crashes when processing a invalid `<map>` element that causes it to use an image after it has been freed

(cherry picked from commit b34591e9067df9cd6fe73b71b1f0d20b3c2bbbc0)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/b34591e9067df9cd6fe73b71b1f0d20b3c2bbbc0 2026-02-16
CVE-2026-25796_post1.patch coders/stegano.c: destroy watermark image prior to throwing exception (#398)

(cherry picked from commit 2024ae1d10a7481d04fb717b3fa9170fd294a8f3)
Ian Constantin <iconstantin94@gmail.com> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/2024ae1d10a7481d04fb717b3fa9170fd294a8f3 2026-02-26
CVE-2026-28494.patch Added checks to avoid possible stack corruption (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-932h-jw47-73jm) Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/f6cd30e0493635eb0b8a4e3dd93c1ac14a35a7e9 2026-02-28
CVE-2026-28686_28687_28688_28689_28690_28692.patch jumbo security patch
(cherry picked from commit 6a602fb36f181a0089848344a3b0d79fc6155a2b)

Fix CVE-2026-28686, CVE-2026-28688, CVE-2026-28689, CVE-2026-28690, CVE-2026-28691, CVE-2026-28692

This fix supersed fixes for CVE-2026-28687
Cristy <urban-warrior@imagemagick.org> no backport, https://github.com/ImageMagick/ImageMagick6/commit/6a602fb36f181a0089848344a3b0d79fc6155a2b 2026-02-22
CVE-2026-28693_pre1.patch https://gist.github.com/mescuwa/9197f4317a69559cdf87d0bfab6fa473
(cherry picked from commit 98b5af39db1a18153abf0b2ad604dc112de94fba)
Cristy <urban-warrior@imagemagick.org> no backport, https://github.com/ImageMagick/ImageMagick6/commit/98b5af39db1a18153abf0b2ad604dc112de94fba 2025-08-23
CVE-2026-28693_1.patch https://github.com/ImageMagick/ImageMagick/pull/8573
(cherry picked from commit c54e9b365118972f939b0efcdd5087e106eb8945)
Cristy <urban-warrior@imagemagick.org> yes upstream backport, https://github.com/ImageMagick/ImageMagick6/commit/c54e9b365118972f939b0efcdd5087e106eb8945 2026-02-28
CVE-2026-28693_2.patch Added extra check.
(cherry picked from commit b13562f805d36de13c7c66c5fca6a6505495aae1)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/b13562f805d36de13c7c66c5fca6a6505495aae1 2026-03-01
0001-Fix-br-tag.patch Fix br tag
find . -path './.git' -prune -o -type 'f' -name '*.html' -exec sed -i 's,<br>,<br />,g' {} \;
Bastien ROUCARIÈS <roucaries.bastien@gmail.com> invalid 2018-02-02
0002-Fix-api-Image-.html.patch Fix api/Image++.html Bastien ROUCARIÈS <roucaries.bastien@gmail.com> invalid 2016-12-14
0003-Fix-www-api-mophologie.html.patch Fix www/api/mophologie.html Bastien ROUCARIÈS <roucaries.bastien@gmail.com> invalid 2016-12-14
0004-Fix-www-command-line-options.html.patch Fix www/command-line-options.html Bastien ROUCARIÈS <roucaries.bastien@gmail.com> invalid 2016-12-14
0005-Use-modern-idiom-for-autoconf.patch Use modern idiom for autoconf Bastien ROUCARIÈS <roucaries.bastien@gmail.com> invalid 2015-09-15
0006-Allow-distribution-to-custumize-the-html-pointer-to-.patch Allow distribution to custumize the html pointer to documentation
Allow to say on debian system you might install the imagemagick-doc package
Bastien ROUCARIÈS <roucaries.bastien@gmail.com> invalid debian 2018-02-02
0007-Improve-policy-in-order-to-be-safer.patch Improve policy in order to be safer
Limit memory and disk to safe value.

Disable http delegate. You should really use curl
Bastien ROUCARIÈS <roucaries.bastien@gmail.com> no 2016-11-22
0008-Fix-remaining-error-in-html-files.patch Fix remaining error in html files Bastien ROUCARIÈS <roucaries.bastien@gmail.com> no 2017-03-18
0009-Improve-man-page-to-use-version-information-and-quan.patch Improve man page to use version information and quantum
Use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,$1(1),$1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@(1),g" *.in' sedtest
use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,fB$1,fB$1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@,g" *.in' sedtest
use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,.TH $1,.TH $1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@,g" *.in' sedtest
Bastien ROUCARIÈS <roucaries.bastien@gmail.com> no 2017-03-21
0010-Fix-changelog-tag-mismatch.patch Fix changelog tag mismatch Bastien ROUCARIÈS <roucaries.bastien@gmail.com> no 2017-06-04
0011-Fix-html-error-in-api-Image-.html.patch Fix html error in api/Image++.html Bastien ROUCARIÈS <roucaries.bastien@gmail.com> invalid 2017-08-11
0012-Fix-www-escape.html.patch Fix www/escape.html Bastien ROUCARIÈS <roucaries.bastien@gmail.com> invalid 2017-08-11
0013-Fix-www-magick-script.html.patch Fix www/magick-script.html Bastien ROUCARIÈS <roucaries.bastien@gmail.com> invalid 2017-08-11
0014-Fix-www-support.html.patch Fix www/support.html Bastien ROUCARIÈS <roucaries.bastien@gmail.com> invalid 2017-08-11
0015-Fix-instead-of-lt-and-input-form.patch Fix < instead of &lt; and input form Bastien ROUCARIÈS <roucaries.bastien@gmail.com> invalid 2018-02-03
0016-Fix-another-errors-in-html-files.patch Fix another errors in html files Bastien ROUCARIÈS <roucaries.bastien@gmail.com> invalid 2018-03-19
0017-Fix-index.html.patch Fix index.html Bastien Roucariès <rouca@debian.org> invalid 2018-07-30
0018-Fix-end-tags.patch Fix end tags Bastien Roucariès <rouca@debian.org> invalid 2018-07-30
0019-Fix-a-few-html-error.patch Fix a few html error Bastien Roucariès <rouca@debian.org> invalid 2020-07-26
0020-Fix-a-typo-in-manpage.patch Fix a typo in manpage Bastien Roucariès <rouca@debian.org> no 2020-07-27
0021-Finalize-fixing-error-in-html.patch Finalize fixing error in html Bastien Roucariès <rouca@debian.org> no 2021-01-11
0022-FIx-error-in-new-upstream-html.patch FIx error in new upstream html Bastien Roucariès <rouca@debian.org> invalid 2021-02-01
0001-https-github.com-ImageMagick-ImageMagick6-issues-145.patch https://github.com/ImageMagick/ImageMagick6/issues/145 Cristy <mikayla-grace@urban-warrior.org> no 2021-04-10
0023-disable-ghostscript-formats.patch disable ghostscript handled formats based on -SAFER insecurity
Based on Tavis Ormandy's Recommendations
Steve Beattie <steve.beattie@canonical.com> no
move-profile-property-to-cli-option.patch move `-set profile` handler to CLI Cristy <urban-warrior@imagemagick.org> no 2023-02-03
CVE-2021-20241.patch fix division by zero in WriteJP2Image() in coders/jp2.c Zhang Xiaohui <ruc_zhangxiaohui@163.com> no 2021-02-02
CVE-2021-20243.patch https://github.com/ImageMagick/ImageMagick/pull/3177 Cristy <mikayla-grace@urban-warrior.org> no 2021-02-03
CVE-2021-20244.patch uses the PerceptibleReciprocal() to prevent the divide-by-zero from occurring (#3194)

(cherry picked from commit 329dd528ab79531d884c0ba131e97d43f872ab5d)

This backports the fix for CVE-2021-20244 to IM6.
ruc_zhangxiaohui <553441439@qq.com> no 2021-02-04
CVE-2021-20245.patch https://github.com/ImageMagick/ImageMagick/issues/3176 Cristy <mikayla-grace@urban-warrior.org> no 2021-02-03
CVE-2021-20246.patch https://github.com/ImageMagick/ImageMagick/issues/3195 Cristy <mikayla-grace@urban-warrior.org> no 2021-02-03
CVE-2021-20309.patch https://github.com/ImageMagick/ImageMagick/issues/3296 Cristy <mikayla-grace@urban-warrior.org> no 2021-02-25
CVE-2021-20312_20313.patch possible divide by zero + clear buffers Cristy <mikayla-grace@urban-warrior.org> no 2021-02-25
CVE-2021-3574.patch https://github.com/ImageMagick/ImageMagick/issues/3540 Cristy <mikayla-grace@urban-warrior.org> no 2021-04-13
CVE-2021-39212.patch Use the correct rights. Dirk Lemstra <dirk@lemstra.org> no 2021-09-11
CVE-2021-4219.patch https://github.com/ImageMagick/ImageMagick/issues/4626 Cristy <mikayla-grace@urban-warrior.org> no 2021-12-22
CVE-2022-1114.patch Coders: https://github.com/ImageMagick/ImageMagick/issues/4947 Cristy <urban-warrior@imagemagick.org> no 2022-03-15
CVE-2022-28463.patch https://github.com/ImageMagick/ImageMagick/issues/4988 Cristy <urban-warrior@imagemagick.org> no 2022-03-26
CVE-2022-32545.patch Pull request: https://github.com/ImageMagick/ImageMagick/pull/4963 Cristy <urban-warrior@imagemagick.org> no 2022-03-19
CVE-2022-32546.patch https://github.com/ImageMagick/ImageMagick/pull/4986 Cristy <urban-warrior@imagemagick.org> no 2022-03-24
CVE-2022-32547.patch https://github.com/ImageMagick/ImageMagick/pull/5034 Cristy <urban-warrior@imagemagick.org> no 2022-04-09
0041-1-2-CVE-2021-3610-eliminate-heap-buffer-overflow-vul.patch [1/2] CVE-2021-3610 eliminate heap buffer overflow vulnerability in TIFF coder

thanks to ZhangJiaxing (@r0fm1a) from Codesafe Team of Legendsec at Qi'anxin Group
Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/b307bcadcdf6ea6819951ac1786b7904f27b25c6.patch 2021-05-27
0042-2-2-CVE-2021-3610-eliminate-heap-buffer-overflow-vul.patch [2/2] CVE-2021-3610 eliminate heap buffer overflow vulnerability in TIFF coder

Thanks to ZhangJiaxing (@r0fm1a) from Codesafe Team of Legendsec at Qi'anxin Group

(cherry picked from commit c75ae771a00c38b757c5ef4b424b51e761b02552)
Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/b307bcadcdf6ea6819951ac1786b7904f27b25c6.patch 2021-05-30
0043-heap-based-buffer-overflow-in-TIFF-coder-alert-from-.patch heap-based buffer overflow in TIFF coder (alert from Hunter Mitchell) Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/e1fbcdf3aad96d51db65c1601117396eac665a6d 2021-07-26
0044-heap-based-buffer-overflow-in-TIFF-coder-alert-from-.patch heap-based buffer overflow in TIFF coder (alert from Hunter Mitchell) Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/35b88c9166bc1b3ce8893f52217bae00d8e2c532 2021-07-26
0045-heap-based-buffer-overflow-in-TIFF-coder-alert-from-.patch heap-based buffer overflow in TIFF coder (alert from Hunter Mitchell) Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/f90a091c7dd12cc53b0999bf49d1c80651534eea 2021-07-26
0046-Fix-a-non-initialized-value-passed-to-TIFFGetField.patch Fix a non initialized value passed to TIFFGetField() Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/995de330310dd35531165d9471fe4d31e0fa79ae 2021-09-03
0047-initialize-buffer-before-calling-TIFFGetField.patch initialize buffer before calling TIFFGetField() Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/995de330310dd35531165d9471fe4d31e0fa79ae 2021-09-04
0048-Fix-stack-overflow-when-parsing-malicious-tiff-image.patch Fix stack overflow when parsing malicious tiff image
(cherry picked from commit 85a370c79afeb45a97842b0959366af5236e9023)
Cristy <mikayla-grace@urban-warrior.org> no https://github.com/ImageMagick/ImageMagick6/commit/85a370c79afeb45a97842b0959366af5236e9023 2021-10-19
0049-early-exit-on-exception.patch early exit on exception
In case of malformed tiff image bail early

(cherry picked from commit b272acab91444f2115099fe51ee6c91bb4db5d50)
Cristy <mikayla-grace@urban-warrior.org> no https://github.com/ImageMagick/ImageMagick6/commit/b272acab91444f2115099fe51ee6c91bb4db5d50 2021-11-06
0050-Fix-buffer-overrun-in-TIFF-coder.patch Fix buffer overrun in TIFF coder Cristy <mikayla-grace@urban-warrior.org> no https://github.com/ImageMagick/ImageMagick6/commit/2204eb57ae00b005b39165a47b8984eac01600a5 2021-03-14
0051-Fix-buffer-overrun-in-TIFF-coder.patch Fix buffer overrun in TIFF coder Cristy <mikayla-grace@urban-warrior.org> no https://github.com/ImageMagick/ImageMagick6/commit/add9cb14e14eef02806715d97abcf5d04a3e55dd 2021-12-17
0052-Fix-buffer-overrun-in-TIFF-coder.patch Fix buffer overrun in TIFF coder Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/de6ada9a068b01494bfb848024ed46942da9d238 2022-03-17
0053-Fix-unintialised-value.patch Fix unintialised value Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/409d42205927c98cbb852ca96e109716f38f04ab 2022-02-11
0054-Raise-exception-when-image-could-not-be-read-but-no-.patch Raise exception when image could not be read but no exception was raised.

Bail out in case of corrupted image

https://github.com/ImageMagick/ImageMagick6/commit/3e15c68efcb1e6383c93e7dfe38ba6c37e614d1b
(cherry picked from commit 3e15c68efcb1e6383c93e7dfe38ba6c37e614d1b)
Dirk Lemstra <dirk@lemstra.org> no 2022-02-19
0055-CVE-2022-1115-heap-based-overflow-with-a-specially-c.patch CVE-2022-1115: heap based overflow with a specially crafted TIFF image Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51 2022-03-22
0056-CVE-2023-1289-recursion-detection-framework.patch CVE-2023-1289: recursion detection framework Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/e8c0090c6d2df7b1553053dca2008e96724204bf 2023-03-06
0057-CVE-2023-1289-recursion-detection.patch CVE-2023-1289 recursion detection Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/706d381b7eb79927d328c96f7b7faab5dc109368 2023-03-06
0058-CVE-2023-1906.patch CVE-2023-1906
A heap-based buffer overflow issue was discovered in ImageMagick's
ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c.
An attacker could pass specially crafted file to convert, triggering
an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/e30c693b37c3b41723f1469d1226a2c814ca443d 2023-04-01
0059-1-2-Prepare-CVE-2023-34151-improved-range-checking.patch [1/2] Prepare CVE-2023-34151 :improved range checking Cristy <urban-warrior@imagemagick.org> no 2023-04-15
0060-2-2-Prepare-CVE-2023-34151-add-additional-checks-for.patch [2/2] Prepare CVE-2023-34151: add additional checks for casting double to size_t Cristy <urban-warrior@imagemagick.org> no 2023-04-13
0061-CVE-2023-34151-properly-cast-double-to-size_t.patch CVE-2023-34151: properly cast double to size_t Cristy <urban-warrior@imagemagick.org> yes upstream 2023-05-17
0062-heap-buffer-overflow-in-ImageMagick-7.1.1-12-contrib.patch heap-buffer-overflow in ImageMagick <= 7.1.1-12, contributed by Hardik shah of Vehere (Dawn Treaders team)


This fix CVE-2023-3428
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/0d00400727170b0540a355a1bc52787bc7bcdea5 2023-06-26
0063-Added-check-for-invalid-size.patch Added check for invalid size. Dirk Lemstra <dirk@lemstra.org> no https://github.com/ImageMagick/ImageMagick6/commit/94f76dd2f760241bec51e7d66873e77a58d812ba.patch 2021-11-30
0064-improve-BMP-error-checking.patch improve BMP error checking
bug; https://github.com/ImageMagick/ImageMagick/issues/5980
Cristy <urban-warrior@imagemagick.org> no 2023-01-18
0065-CVE-2023-5341.patch CVE-2023-5341 Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/405684654eb9b43424c3c0276ea343681021d9e0 2023-09-24
0066-CVE-2023-34151-properly-cast-double-to-size_t.patch CVE-2023-34151: properly cast double to size_t

forgot to cast double to unsigned int
Cristy <urban-warrior@imagemagick.org> yes debian upstream https://github.com/ImageMagick/ImageMagick6/commit/be15ac962dea19536be1009d157639030fc42be9.patch 2024-04-23
0067-CVE-2023-34151.patch CVE-2023-34151
This is a prerequist for fixing it

magick produces incorrect result possibly due to overflow
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/8b7b17c8fef72dab479e6ca676676d8c5e395dd6 2022-02-21
0068-incorrect-bounds-checking-for-draw-affine-https-gith.patch incorrect bounds checking for draw affine @ https://github.com/ImageMagick/ImageMagick/issues/5497 Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/c5a9368d871943eceafce143bb87612b2a9623b2.patch 2022-08-28
0069-CVE-2023-34151.patch CVE-2023-34151
improved range checking (https://github.com/ImageMagick/ImageMagick/issues/6341)
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/75ebd9975f6ba8106ec15a6b3e6ba95f4c14e117.patch 2024-04-19
0070-check-for-value-0-ceil-not-required.patch check for value < 0, ceil() not required
This patch addresses CVE-2023-34151, not a recurring bug of CVE-2022-32546.

Cast from double to integer is hard to correctly and was fixed by a few patches upstream.
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/b72508c8fce196cd031856574c202490be830649.patch 2024-04-19
0071-fix-undefined-behaviors-when-casting-double-to-size_.patch fix undefined behaviors when casting double to size_t
This is needed for fixing CVE-2023-34151

Cast from double to integer is hard to correctly and was fixed by a few patches upstream.
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/88789966667b748f14a904f8c9122274810e8a3e 2024-04-19
0072-use-a-different-path-for-positive-and-negative-value.patch use a different path for positive and negative values
This is needed for fixing CVE-2023-34151

Cast from double to integer is hard to correctly and was fixed by a few patches upstream.
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/bc5ac19bd93895e5c6158aad0d8e49a0c50b0ebb.patch 2024-04-20
0073-use-instead-to-work-around-precision-limitations-of-.patch use >= instead to work around precision limitations of a double.
This is needed for fixing CVE-2023-34151

Cast from double to integer is hard to correctly and was fixed by a few patches upstream.
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/3252d4771ff1142888ba83c439588969fcea98e4.patch 2024-04-23
0074-CVE-2023-1289-recursion-detection-fail.patch CVE-2023-1289: recursion detection fail
This is a partial revert of the detection recursion of CVE-2023-1289.
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/1485a4c2cba8ca32981016fa25e7a15ef84f06f6.patch 2023-03-06
0075-improved-fix-for-possible-DoS-for-certain-SVG-constr.patch improved fix for possible DoS for certain SVG constructs
This is partial fix CVE-2023-1289
Cristy <mikayla-grace@urban-warrior.org> no https://github.com/ImageMagick/ImageMagick6/commit/84ec30550c3146f525383f18a786a6bbd5028a93.patch 2021-12-23
0076-permit-compositing-MPRI-images.patch permit compositing MPRI images
This fix follow up of CVE-2023-1289
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/4dd4d0df449acb13fb859041b4996af58243e352.patch 2022-01-29
0077-VID-images-not-permitted-when-compositing.patch VID images not permitted when compositing
This fix followup of CVE-2023-1289
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/f4529c0dcf3a8f96c438086b28fbef8338cda0b1.patch 2022-01-31
0078-do-not-composite-SVG-to-avoid-possible-recursion.patch do not composite SVG to avoid possible recursion
This is part of fix of CVE-2023-1289
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/75aac79108af0c0b0d7fc88b1f09c340b0d62c85.patch 2023-03-06
0079-recursion-detection-framework.patch recursion detection framework
Avoid a memory leak in previous patches
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/060660bf45e0771cf0431e5c2749aa51fabf23f8.patch 2023-03-06
0080-Fixed-memory-leak.patch Fixed memory leak. Dirk Lemstra <dirk@lemstra.org> no https://github.com/ImageMagick/ImageMagick6/commit/c90e79b3b22fec309cab55af2ee606f71b027b12.patch 2023-07-16
0001-Update-the-image-depth-after-this-has-been-changed-b.patch Update the image depth after this has been changed by SetQuantumFormat. Dirk Lemstra <dirk@lemstra.org> no 2025-02-11
CVE-2025-53014.patch Correct out of bounds read of a single byte. Dirk Lemstra <dirk@lemstra.org> yes upstream backport, https://github.com/ImageMagick/ImageMagick/commit/29d82726c7ec20c07c49ba263bdcea16c2618e03 2025-06-26
CVE-2025-53019.patch Fixed memory leak when entering StreamImage multiple times. Dirk Lemstra <dirk@lemstra.org> yes upstream backport, https://github.com/ImageMagick/ImageMagick/commit/fc3ab0812edef903bbb2473c0ee652ddfd04fe5c 2025-06-27
CVE-2025-53101.patch CVE-2025-53101 Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/643deeb60803488373cd4799b24d5786af90972e 2025-06-27
CVE-2025-55154.patch CVE-2025-55154 Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/14234b2d3be45af1f71ffafd260532bbd8f81d39 2025-08-09
statistic-private.patch Private alias for easing backport Bastien Roucariès <rouca@debian.org> no backport, https://github.com/ImageMagick/ImageMagick/commit/7e5d87fe6e92b6cc3e96d5175974626317512dd9 2025-09-07
CVE-2025-55212-1.patch Added checks for invalid with or height to ThumbnailImage Dirk Lemstra <dirk@lemstra.org> yes upstream backport, https://github.com/ImageMagick/ImageMagick6/commit/5fddcf974342d8e5e02f604bc2297c038e3d4196 2025-08-14
CVE-2025-55212-2.patch CVE-2025-55212 Cristy <urban-warrior@imagemagick.org> yes upstream backport, https://github.com/ImageMagick/ImageMagick6/commit/3482953ef0af1e538cb776162a8d278141e0b9a0 2025-08-17
CVE-2025-55298-pre1.patch CVE-2025-55298 prepare
Crop filename pattern %03d no longer works in ImageMagick 7


(cherry picked from commit 1242136dfdbb2549bacdaddb9b8a5e75fe043789)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick/commit/1242136dfdbb2549bacdaddb9b8a5e75fe043789 2025-07-19
CVE-2025-55298-pre2.patch commit 2a68d6873954b05d4fad678dc8ff811416915c48

eliminate compiler exception

===================================================================
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick/commit/2a68d6873954b05d4fad678dc8ff811416915c48 2025-07-19
CVE-2025-55298-pre3.patch CVE-2025-55298 prepare
don't forget the end filename segment



(cherry picked from commit 29e72edc9d3a4e87c4d6d102a8e2a7e0e9054ee4)
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick/commit/29e72edc9d3a4e87c4d6d102a8e2a7e0e9054ee4 2025-07-19
CVE-2025-55298-pre4.patch CVE-2025-55298 prepare
more boundary checks


(cherry-picked from c70a18c3ac9579e25255fe0279bf81878a403b66)
Cristy <urban-warrior@imagemagick.org> no backport, https://github.com/ImageMagick/ImageMagick/commit/c70a18c3ac9579e25255fe0279bf81878a403b66 2025-07-19
CVE-2025-55298-1.patch [1/2] CVE-2025-55298


(cherry picked from commit 731ce3a7aa7fabebaa322711c04ce5f5cf22edf4)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick/commit/731ce3a7aa7fabebaa322711c04ce5f5cf22edf4 2025-08-17
CVE-2025-55298-2.patch [2/2] CVE-2025-55298

(cherry picked from commit d789bdf7aabb955b88fbc95653aa9dbf6c5d259f)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick/commit/d789bdf7aabb955b88fbc95653aa9dbf6c5d259f 2025-08-17
CVE-2025-57803-pre1.patch correct bytes per line calculation Cristy <urban-warrior@imagemagick.org> no backport, https://github.com/ImageMagick/ImageMagick6/337225582be0e4b3c6a395c5fcc2732684a2b3ab 2023-10-20
CVE-2025-57803.patch CVE-2025-57803

(cherry picked from commit e49c68c88eed6e68145480a471650daa9ed87217)
Cristy <urban-warrior@imagemagick.org> yes upstream backport, https://github.com/ImageMagick/ImageMagick/commit/e49c68c88eed6e68145480a471650daa9ed87217 2025-08-23
CVE-2025-57807.patch CVE-2025-57807


(cherry picked from commit ab1bb3d8ed06d0ed6aa5038b6a74aebf53af9ccf)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick/commit/ab1bb3d8ed06d0ed6aa5038b6a74aebf53af9ccf 2025-08-24
CVE-2025-62171.patch Added extra check to resolve issue on 32-bit systems (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9pp9-cfwx-54rm)

(cherry picked from commit 456771fae8baa9558a1421ec8d522e6937d9b2d7)
Dirk Lemstra <dirk@lemstra.org> yes debian upstream https://github.com/ImageMagick/ImageMagick6/commit/456771fae8baa9558a1421ec8d522e6937d9b2d7 2025-10-12
CVE-2025-65955.patch Correct incorrect free (GHSA-q3hc-j9x5-mp9m)

(cherry picked from commit 7d4c27fd4cb2a716a9c1d3346a5e79a692cfe6d8)
Dirk Lemstra <dirk@lemstra.org> no https://github.com/ImageMagick/ImageMagick6/commit/7d4c27fd4cb2a716a9c1d3346a5e79a692cfe6d8 2025-11-23
CVE-2025-66628.patch Added extra check to avoid an overflow on 32-bit machines (GHSA-6hjr-v6g4-3fm8)

(cherry picked from commit 7779f1ff772dfabe545c67fb2f3bfa8f7a845a2d)
Dirk Lemstra <dirk@lemstra.org> no debian https://github.com/ImageMagick/ImageMagick6/commit/7779f1ff772dfabe545c67fb2f3bfa8f7a845a2d 2025-12-02
CVE-2025-68469.patch CVE-2025-68469
While Processing a crafted TIFF file, imagemagick crashes.

Note that this patch fix also CVE-2023-3428 that is a variation of CVE-2025-68469
Bastien Roucariès <rouca@debian.org> yes upstream https://github.com/ImageMagick/ImageMagick/issues/8508#issuecomment-3699838767 2025-12-30
CVE-2025-68618.patch CVE-2025-68618

[backport]
- drop unrelated policy patch

(cherry picked from commit 693c8497290ea0c7cac75d3068ea4fa70d7d507e)
Cristy <urban-warrior@imagemagick.org> yes upstream backport, https://github.com/ImageMagick/ImageMagick6/commit/693c8497290ea0c7cac75d3068ea4fa70d7d507e 2025-12-21
CVE-2025-68950.patch CVE-2025-68950 Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/5655e26ee9032a208ad9add1fde2877205d5e540 2025-12-26
CVE-2025-69204.patch CVE-2025-69204

(cherry picked from commit c46bc2a29d0712499173c6ffda1d38d7dc8861f5)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/c46bc2a29d0712499173c6ffda1d38d7dc8861f5 2025-12-27
CVE-2026-23874.patch MSL: Stack overflow via infinite recursion in ProcessMSLScript
(cherry picked from commit fe2970bbbe02c6fe875cc2b269390a3165d57706)
Cristy <urban-warrior@imagemagick.org> yes debian upstream https://github.com/ImageMagick/ImageMagick6/commit/fe2970bbbe02c6fe875cc2b269390a3165d57706 2026-01-15
CVE-2026-23876.patch Added overflow checks to prevent an out of bounds write
(cherry picked from commit 536512a2c60cd6e8c21c1256c2ee4da48d903e0c)
Dirk Lemstra <dirk@lemstra.org> yes debian upstream https://github.com/ImageMagick6/ImageMagick/commit/536512a2c60cd6e8c21c1256c2ee4da48d903e0c 2026-01-18
CVE-2026-23952.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-5vx3-wx4q-6cj8

(cherry picked from commit 0e4023775c8859d2b802e8b459a27b599ca8403a)
Cristy <urban-warrior@imagemagick.org> yes debian upstream backport, https://github.com/ImageMagick6/ImageMagick/commit/0e4023775c8859d2b802e8b459a27b599ca8403a 2026-01-15
CVE-2026-24481.patch Initialize the pixels with empty values to prevent possible heap information disclosure
(https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-96pc-27rx-pr36)

(cherry picked from commit 38872ec2a70084813883ea152f18497911823c18)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/38872ec2a70084813883ea152f18497911823c18 2026-01-25
CVE-2026-24484_1.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-wg3g-gvx5-2pmv

Magick fails to check for multi-layer nested mvg conversions to svg, leading to DoS

(cherry picked from commit c47b28f700fc454e4f7c16e197a55149120697ea)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/c47b28f700fc454e4f7c16e197a55149120697ea 2026-01-23
CVE-2026-24484_2.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-wg3g-gvx5-2pmv

Magick fails to check for multi-layer nested mvg conversions to svg, leading to DoS

(cherry picked from commit 151dcb4f0246d1285cbd756a1f32797894ad5da5)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/151dcb4f0246d1285cbd756a1f32797894ad5da5 2026-01-24
CVE-2026-30883.patch Added extra check to prevent overflow that could result in a heap over-write
(https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qmw5-2p58-xvrc)

(cherry picked from commit 3875619331d2c7c74a80d34665cbc06e6ed4359a)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/3875619331d2c7c74a80d34665cbc06e6ed4359a 2026-03-06
CVE-2026-30936.patch CVE-2026-30936
a crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur
Bastien Roucariès <rouca@debian.org> yes upstream backport, https://github.com/ImageMagick/ImageMagick/commit/ffbbd7201e0ba08707849c0053aa703e076bf86e 2026-03-17
CVE-2026-30937.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qpg4-j99f-8xcg

(cherry picked from commit 42e5a37eeb60ca4fdede5060c0aa60802c2dc701)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/42e5a37eeb60ca4fdede5060c0aa60802c2dc701 2026-02-28
CVE-2026-24485.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-pqgj-2p96-rx85

When a PCD file does not contain a valid Sync marker, the DecodeImage() function becomes trapped in an infinite loop while searching for the Sync marker, causing the program to become unresponsive and continuously consume CPU resources, ultimately leading to system resource exhaustion and denial of service

(cherry picked from commit 75904c39049ec0b8d81eb7131bb05c0b23ad3189)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/75904c39049ec0b8d81eb7131bb05c0b23ad3189 2026-01-22
CVE-2026-25576_1.patch No longer allow mutations on the first image of the list (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-jv4p-gjwq-9r2j

(cherry picked from commit 95db8ba0f445a798e823a86acdebe97de73de449)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/95db8ba0f445a798e823a86acdebe97de73de449 2026-01-25
CVE-2026-25576_2.patch Fixed out of bounds read in multiple coders that read raw pixel data (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-jv4p-gjwq-9r2j)

(cherry picked from commit 44b3140f3414ebc02c5fa8b80551f7d33950a87a)
Dirk Lemstra <dirk@lemstra.org> yes upstream backport, https://github.com/ImageMagick/ImageMagick6/commit/44b3140f3414ebc02c5fa8b80551f7d33950a87a 2026-01-25
CVE-2026-25638.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-xxw5-m53x-j38c#advisory-comment-159495

(cherry picked from commit c5b4a1c6ff347f66346cbec499f3e881da21faf3)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/c5b4a1c6ff347f66346cbec499f3e881da21faf3 2026-02-10
CVE-2026-25795.patch Fixed NULL pointer dereference in ReadSFWImage (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-p33r-fqw2-rqmm)

(cherry picked from commit b2b4f0107ba3a4427f1b5ded803c1d2cc77f2a89)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/b2b4f0107ba3a4427f1b5ded803c1d2cc77f2a89 2026-02-06
CVE-2026-25796.patch Prevent memory leak in early exits (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-g2pr-qxjg-7r2w)

(cherry picked from commit 29aeed740553ed4e5c544e101ac468be55a919ff)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/29aeed740553ed4e5c544e101ac468be55a919ff 2026-02-06
CVE-2026-25797_CVE-2026-25965_CVE-2026-25968_CVE-2026-25982.patch jumbo security patch: addresses memory leak, stack overflow, out-of-bounds, integer overflow, OOB read

Fix CVE-2026-25965, CVE-2026-25797, CVE-2026-25968 and CVE-2026-25982

(cherry picked from commit b4c37614b6da7695cb4f5b3c6e326a37bdf2b1a9)
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/b4c37614b6da7695cb4f5b3c6e326a37bdf2b1a9 2026-01-29
CVE-2026-25797_1_post.patch fix compiler exception
(cherry picked from commit 963cd0771923f4aabfe9047eab0752d88829bcdd)
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/b4c37614b6da7695cb4f5b3c6e326a37bdf2b1a9 2026-01-29
CVE-2026-25797_2.patch Properly escape the strings that are written as raw html (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-rw6c-xp26-225v)

(cherry picked from commit 7284564901441ddb04dadaad306e9f0fb527d71f)
Dirk Lemstra <dirk@lemstra.org> no backport, https://github.com/ImageMagick/ImageMagick6/commit/7284564901441ddb04dadaad306e9f0fb527d71f 2026-02-20
CVE-2026-25798.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-p863-5fgm-rgq4

NULL pointer dereference in ClonePixelCacheRepository allows a remote attacker to crash any application linked against ImageMagick by supplying a crafted image file, resulting in denial of service.

(cherry picked from commit 93a38e3a7bfb7a492409275321eca94df7cd03a7)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/93a38e3a7bfb7a492409275321eca94df7cd03a7 2026-02-01
CVE-2026-31853.patch Corrected the overflow check that can cause issues on 32-bit systems (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-56jp-jfqg-f8f4)

(cherry picked from commit fa85920aa28ee1887cc3c5d7d5272b3650d3b168)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/fa85920aa28ee1887cc3c5d7d5272b3650d3b168 2026-03-02
CVE-2026-25799.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-543g-8grm-9cw6

a logic error in YUV sampling factor validation allows an invalid sampling factor to bypass checks and trigger a division-by-zero during image loading, resulting in a reliable denial-of-service

(cherry picked from commit 44c687dee38eb1a8053facb4a33dfa1e255875ea)
Cristy <urban-warrior@imagemagick.org> yes upstream backport, https://github.com/ImageMagick/ImageMagick6/commit/44c687dee38eb1a8053facb4a33dfa1e255875ea 2026-01-31
CVE-2026-25897.patch Added extra check to prevent out of bounds heap write on 32-bit systems
(https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-6j5f-24fw-pqp4)

(cherry picked from commit 5e28bb254210580ac12234cc9ba4ae57c193129c)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick/commit/5e28bb254210580ac12234cc9ba4ae57c193129c 2026-02-06
CVE-2026-25898_1.patch Fixed out of bound read with negative pixel index (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-vpxv-r9pg-7gpr)

(cherry picked from commit 66d3a6497eb89b3ce2a7b86cc23be6d69bce9220)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/66d3a6497eb89b3ce2a7b86cc23be6d69bce9220 2026-02-06
CVE-2026-25898_2.patch Fixed out of bound read with negative pixel index (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-vpxv-r9pg-7gpr)

(cherry picked from commit abfbcfe8e7884deb3560c74569c96ee4b068f3a6)
Dirk Lemstra <dirk@lemstra.org> yes upstream backport, https://github.com/ImageMagick/ImageMagick6/commit/abfbcfe8e7884deb3560c74569c96ee4b068f3a6 2026-02-08
CVE-2026-25970.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-xg29-8ghv-v4xr

a signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file

(cherry picked from commit 9dd1ce6d8c1f66971cef275fb31cc079b9f4e186)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/9dd1ce6d8c1f66971cef275fb31cc079b9f4e186 2026-02-01
CVE-2026-25983.patch Run checks before accessing the image (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-fwqw-2x5x-w566).

(cherry picked from commit e5d3ca6dfb76dccb5bdf73c74135e0fde2f9d0b7)
Dirk Lemstra <dirk@lemstra.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/e5d3ca6dfb76dccb5bdf73c74135e0fde2f9d0b7 2026-01-26
CVE-2026-25986.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-mqfc-82jx-3mr2

a heap buffer overflow write vulnerability exists in ReadYUVImage() (coders/yuv.c) when processing malicious YUV 4:2:2 (NoInterlace) images. The pixel-pair loop writes one pixel beyond the allocated row buffer.

(cherry picked from commit 99340686966580c06a1599e247dc41fb59a430c8)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/99340686966580c06a1599e247dc41fb59a430c8 2026-02-07
CVE-2026-25987.patch https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-42p5-62qq-mmh7

A heap buffer over-read vulnerability exists in the MAP image decoder when processing crafted MAP files, potentially leading to crashes or unintended memory disclosure during image decoding.

(cherry picked from commit a842cd896a19744b5577b6113990faaae14569b0)
Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/a842cd896a19744b5577b6113990faaae14569b0 2026-02-07

All known versions for source package 'imagemagick'

Links