vulnerability
Amazon Linux 2023: CVE-2025-53101: Medium priority package update for ImageMagick
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:M/Au:N/C:N/I:C/A:P) | Jul 14, 2025 | Aug 5, 2025 | Aug 5, 2025 |
Severity
8
CVSS
(AV:N/AC:M/Au:N/C:N/I:C/A:P)
Published
Jul 14, 2025
Added
Aug 5, 2025
Modified
Aug 5, 2025
Description
ImageMagick is free and open-source software used for editing and manipulating digital images. In versions prior to 7.1.2-0 and 6.9.13-26, in ImageMagick's `magick mogrify` command, specifying multiple consecutive `%d` format specifiers in a filename template causes internal pointer arithmetic to generate an address below the beginning of the stack buffer, resulting in a stack overflow through `vsnprintf()`. Versions 7.1.2-0 and 6.9.13-26 fix the issue.
Solutions
amazon-linux-2023-upgrade-imagemagickamazon-linux-2023-upgrade-imagemagick-camazon-linux-2023-upgrade-imagemagick-c-debuginfoamazon-linux-2023-upgrade-imagemagick-c-develamazon-linux-2023-upgrade-imagemagick-debuginfoamazon-linux-2023-upgrade-imagemagick-debugsourceamazon-linux-2023-upgrade-imagemagick-develamazon-linux-2023-upgrade-imagemagick-docamazon-linux-2023-upgrade-imagemagick-libsamazon-linux-2023-upgrade-imagemagick-libs-debuginfoamazon-linux-2023-upgrade-imagemagick-perlamazon-linux-2023-upgrade-imagemagick-perl-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.