vulnerability

SUSE: CVE-2025-57803: SUSE Linux Security Advisory

Severity
9
CVSS
(AV:N/AC:M/Au:S/C:C/I:C/A:C)
Published
Sep 9, 2025
Added
Dec 5, 2025
Modified
Dec 5, 2025

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-28 and 7.1.2-2 for ImageMagick's 32-bit build, a 32-bit integer overflow in the BMP encoder's scanline-stride computation collapses bytes_per_line (stride) to a tiny value while the per-row writer still emits 3 x width bytes for 24-bpp images. The row base pointer advances using the (overflowed) stride, so the first row immediately writes past its slot and into adjacent heap memory with attacker-controlled bytes. This is a classic, powerful primitive for heap corruption in common auto-convert pipelines. This issue has been patched in versions 6.9.13-28 and 7.1.2-2.

Solutions

suse-upgrade-imagemagicksuse-upgrade-imagemagick-config-6-susesuse-upgrade-imagemagick-config-6-upstreamsuse-upgrade-imagemagick-config-7-susesuse-upgrade-imagemagick-config-7-upstreamsuse-upgrade-imagemagick-config-7-upstream-limitedsuse-upgrade-imagemagick-config-7-upstream-opensuse-upgrade-imagemagick-config-7-upstream-securesuse-upgrade-imagemagick-config-7-upstream-websafesuse-upgrade-imagemagick-develsuse-upgrade-imagemagick-devel-32bitsuse-upgrade-imagemagick-docsuse-upgrade-imagemagick-extrasuse-upgrade-libmagick-7_q16hdri4suse-upgrade-libmagick-7_q16hdri5suse-upgrade-libmagick-7_q16hdri5-32bitsuse-upgrade-libmagick-develsuse-upgrade-libmagick-devel-32bitsuse-upgrade-libmagickcore-6_q16-1suse-upgrade-libmagickcore-7_q16hdri10suse-upgrade-libmagickcore-7_q16hdri10-32bitsuse-upgrade-libmagickcore-7_q16hdri6suse-upgrade-libmagickwand-6_q16-1suse-upgrade-libmagickwand-7_q16hdri10suse-upgrade-libmagickwand-7_q16hdri10-32bitsuse-upgrade-libmagickwand-7_q16hdri6suse-upgrade-perl-perlmagick
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.