vulnerability
Amazon Linux 2023: CVE-2025-65955: Medium priority package update for ImageMagick
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:M/Au:N/C:P/I:P/A:P) | Dec 2, 2025 | Jan 12, 2026 | Jan 12, 2026 |
Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
Dec 2, 2025
Added
Jan 12, 2026
Modified
Jan 12, 2026
Description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
Solutions
amazon-linux-2023-upgrade-imagemagickamazon-linux-2023-upgrade-imagemagick-camazon-linux-2023-upgrade-imagemagick-c-debuginfoamazon-linux-2023-upgrade-imagemagick-c-develamazon-linux-2023-upgrade-imagemagick-debuginfoamazon-linux-2023-upgrade-imagemagick-debugsourceamazon-linux-2023-upgrade-imagemagick-develamazon-linux-2023-upgrade-imagemagick-docamazon-linux-2023-upgrade-imagemagick-libsamazon-linux-2023-upgrade-imagemagick-libs-debuginfoamazon-linux-2023-upgrade-imagemagick-perlamazon-linux-2023-upgrade-imagemagick-perl-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.