摘要:
ImageMagick security update
安全等级: High
公告ID: KylinSec-SA-2025-2762
发布日期: 2025年9月8日
关联CVE: CVE-2025-53101 CVE-2025-53019 CVE-2025-53014 CVE-2025-53015
Use ImageMagick to create, edit, compose, or convert bitmap images. It can read and write
images in a variety of formats (over 200) including PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR,
WebP, Postscript, PDF, and SVG. Use ImageMagick to resize, flip, mirror, rotate, distort,
shear and transform images, adjust image colors, apply various special effects,
or draw text, lines, polygons, ellipses and Bézier curves.
Security Fix(es):
ImageMagick is free and open-source software used for editing and manipulating digital images. Versions prior to 7.1.2-0 and 6.9.13-26 have a heap buffer overflow in the `InterpretImageFilename` function. The issue stems from an off-by-one error that causes out-of-bounds memory access when processing format strings containing consecutive percent signs (`%%`). Versions 7.1.2-0 and 6.9.13-26 fix the issue.(CVE-2025-53014)
A vulnerability, which was classified as problematic, was found in ImageMagick up to 7.1.1 (Image Processing Software).CWE is classifying the issue as CWE-835. The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.This is going to have an impact on availability.Upgrading to version 7.1.2-0 eliminates this vulnerability.(CVE-2025-53015)
ImageMagick is free and open-source software used for editing and manipulating digital images. In versions prior to 7.1.2-0 and 6.9.13-26, in ImageMagick's `magick stream` command, specifying multiple consecutive `%d` format specifiers in a filename template causes a memory leak. Versions 7.1.2-0 and 6.9.13-26 fix the issue.(CVE-2025-53019)
ImageMagick is free and open-source software used for editing and manipulating digital images. In versions prior to 7.1.2-0 and 6.9.13-26, in ImageMagick's `magick mogrify` command, specifying multiple consecutive `%d` format specifiers in a filename template causes internal pointer arithmetic to generate an address below the beginning of the stack buffer, resulting in a stack overflow through `vsnprintf()`. Versions 7.1.2-0 and 6.9.13-26 fix the issue.(CVE-2025-53101)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2025-53101 | KY3.5.3 | ImageMagick | Fixed |
CVE-2025-53101 | KY3.5.2 | ImageMagick | Fixed |
CVE-2025-53019 | KY3.5.3 | ImageMagick | Fixed |
CVE-2025-53019 | KY3.5.2 | ImageMagick | Fixed |
CVE-2025-53014 | KY3.5.3 | ImageMagick | Fixed |
CVE-2025-53014 | KY3.5.2 | ImageMagick | Fixed |
CVE-2025-53015 | KY3.5.3 | ImageMagick | Fixed |
CVE-2025-53015 | KY3.5.2 | ImageMagick | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
ImageMagick | x86_64 | 7.1.1.8-7.ky3_5 |
ImageMagick-c++ | x86_64 | 7.1.1.8-7.ky3_5 |
ImageMagick-c++-devel | x86_64 | 7.1.1.8-7.ky3_5 |
ImageMagick-devel | x86_64 | 7.1.1.8-7.ky3_5 |
ImageMagick-help | x86_64 | 7.1.1.8-7.ky3_5 |
ImageMagick-perl | x86_64 | 7.1.1.8-7.ky3_5 |
ImageMagick | aarch64 | 7.1.1.8-7.ky3_5 |
ImageMagick-c++ | aarch64 | 7.1.1.8-7.ky3_5 |
ImageMagick-c++-devel | aarch64 | 7.1.1.8-7.ky3_5 |
ImageMagick-devel | aarch64 | 7.1.1.8-7.ky3_5 |
ImageMagick-help | aarch64 | 7.1.1.8-7.ky3_5 |
ImageMagick-perl | aarch64 | 7.1.1.8-7.ky3_5 |
软件名称 | 架构 | 版本号 |
---|---|---|
ImageMagick | x86_64 | 7.1.1.8-7.ky3_5 |
ImageMagick-c++ | x86_64 | 7.1.1.8-7.ky3_5 |
ImageMagick-c++-devel | x86_64 | 7.1.1.8-7.ky3_5 |
ImageMagick-devel | x86_64 | 7.1.1.8-7.ky3_5 |
ImageMagick-help | x86_64 | 7.1.1.8-7.ky3_5 |
ImageMagick-perl | x86_64 | 7.1.1.8-7.ky3_5 |
ImageMagick | aarch64 | 7.1.1.8-7.ky3_5 |
ImageMagick-c++ | aarch64 | 7.1.1.8-7.ky3_5 |
ImageMagick-c++-devel | aarch64 | 7.1.1.8-7.ky3_5 |
ImageMagick-devel | aarch64 | 7.1.1.8-7.ky3_5 |
ImageMagick-help | aarch64 | 7.1.1.8-7.ky3_5 |
ImageMagick-perl | aarch64 | 7.1.1.8-7.ky3_5 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名