vulnerability

Ubuntu: USN-7728-1 (CVE-2025-53019): ImageMagick vulnerabilities

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Sep 1, 2025
Added
Sep 3, 2025
Modified
Sep 19, 2025

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. In versions prior to 7.1.2-0 and 6.9.13-26, in ImageMagick's `magick stream` command, specifying multiple consecutive `%d` format specifiers in a filename template causes a memory leak. Versions 7.1.2-0 and 6.9.13-26 fix the issue.

Solutions

ubuntu-pro-upgrade-imagemagickubuntu-pro-upgrade-libmagick-5ubuntu-pro-upgrade-libmagick-6-q16-5v5ubuntu-pro-upgrade-libmagick-6-q16-7ubuntu-pro-upgrade-libmagick-6-q16-8ubuntu-pro-upgrade-libmagick-6-q16-9t64ubuntu-pro-upgrade-libmagick-6-q16hdri-7ubuntu-pro-upgrade-libmagick-6-q16hdri-8ubuntu-pro-upgrade-libmagick-6-q16hdri-9t64ubuntu-pro-upgrade-libmagickcore-6-q16-2ubuntu-pro-upgrade-libmagickcore-6-q16-2-extraubuntu-pro-upgrade-libmagickcore-6-q16-3ubuntu-pro-upgrade-libmagickcore-6-q16-3-extraubuntu-pro-upgrade-libmagickcore-6-q16-6ubuntu-pro-upgrade-libmagickcore-6-q16-6-extraubuntu-pro-upgrade-libmagickcore-6-q16-7-extraubuntu-pro-upgrade-libmagickcore-6-q16-7t64ubuntu-pro-upgrade-libmagickcore-6-q16hdri-3ubuntu-pro-upgrade-libmagickcore-6-q16hdri-3-extraubuntu-pro-upgrade-libmagickcore-6-q16hdri-6ubuntu-pro-upgrade-libmagickcore-6-q16hdri-6-extraubuntu-pro-upgrade-libmagickcore-6-q16hdri-7-extraubuntu-pro-upgrade-libmagickcore-6-q16hdri-7t64ubuntu-pro-upgrade-libmagickcore5ubuntu-pro-upgrade-libmagickcore5-extraubuntu-pro-upgrade-libmagickwand-6-q16-2ubuntu-pro-upgrade-libmagickwand-6-q16-3ubuntu-pro-upgrade-libmagickwand-6-q16-6ubuntu-pro-upgrade-libmagickwand-6-q16-7t64ubuntu-pro-upgrade-libmagickwand-6-q16hdri-3ubuntu-pro-upgrade-libmagickwand-6-q16hdri-6ubuntu-pro-upgrade-libmagickwand-6-q16hdri-7t64ubuntu-pro-upgrade-libmagickwand5
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.