{
  "document": {
    "aggregate_severity": {
      "text": "Critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "Bump release to 6.9.10.68-7.0.3.tuxcare.els1",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/oraclelinux7els/advisories/2025/clsa-2025_1765545248.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
      }
    ],
    "tracking": {
      "current_release_date": "2025-12-12T13:16:35Z",
      "generator": {
        "date": "2025-12-12T13:16:35Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1765545248",
      "initial_release_date": "2025-12-12T13:16:35Z",
      "revision_history": [
        {
          "date": "2025-12-12T13:16:35Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Update of ImageMagick"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Oracle Linux 7",
                "product": {
                  "name": "Oracle Linux 7",
                  "product_id": "Oracle-Linux-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Oracle Linux"
          }
        ],
        "category": "vendor",
        "name": "Oracle Corporation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
                "product": {
                  "name": "ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
                  "product_id": "ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/ImageMagick-c++@6.9.10.68-7.0.3.el7_9.tuxcare.els1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
                "product": {
                  "name": "ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
                  "product_id": "ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/ImageMagick@6.9.10.68-7.0.3.el7_9.tuxcare.els1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
                "product": {
                  "name": "ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
                  "product_id": "ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/ImageMagick-c++-devel@6.9.10.68-7.0.3.el7_9.tuxcare.els1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
                "product": {
                  "name": "ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
                  "product_id": "ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/ImageMagick-devel@6.9.10.68-7.0.3.el7_9.tuxcare.els1?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                "product": {
                  "name": "ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                  "product_id": "ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/ImageMagick-c++@6.9.10.68-7.0.3.el7_9.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                "product": {
                  "name": "ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                  "product_id": "ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/ImageMagick-doc@6.9.10.68-7.0.3.el7_9.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                "product": {
                  "name": "ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                  "product_id": "ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/ImageMagick@6.9.10.68-7.0.3.el7_9.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                "product": {
                  "name": "ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                  "product_id": "ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/ImageMagick-c++-devel@6.9.10.68-7.0.3.el7_9.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                "product": {
                  "name": "ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                  "product_id": "ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/ImageMagick-devel@6.9.10.68-7.0.3.el7_9.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                "product": {
                  "name": "ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                  "product_id": "ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/ImageMagick-perl@6.9.10.68-7.0.3.el7_9.tuxcare.els1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686"
        },
        "product_reference": "ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        },
        "product_reference": "ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        },
        "product_reference": "ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686"
        },
        "product_reference": "ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        },
        "product_reference": "ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686"
        },
        "product_reference": "ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        },
        "product_reference": "ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686"
        },
        "product_reference": "ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        },
        "product_reference": "ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        },
        "product_reference": "ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-62171",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "ImageMagick is an open source software suite for displaying, converting, and editing raster image files. In ImageMagick versions prior to 7.1.2-7 and 6.9.13-32, an integer overflow vulnerability exists in the BMP decoder on 32-bit systems. The vulnerability occurs in coders/bmp.c when calculating the extent value by multiplying image columns by bits per pixel. On 32-bit systems with size_t of 4 bytes, a malicious BMP file with specific dimensions can cause this multiplication to overflow and wrap to zero. The overflow check added to address CVE-2025-57803 is placed after the overflow occurs, making it ineffective. A specially crafted 58-byte BMP file with width set to 536,870,912 and 32 bits per pixel can trigger this overflow, causing the bytes_per_line calculation to become zero. This vulnerability only affects 32-bit builds of ImageMagick where default resource limits for width, height, and area have been manually increased beyond their defaults. 64-bit systems with size_t of 8 bytes are not vulnerable, and systems using default ImageMagick resource limits are not vulnerable. The vulnerability is fixed in versions 7.1.2-7 and 6.9.13-32.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-62171"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/commit/cea1693e2ded51b4cc91c70c54096cbed1691c00",
          "url": "https://github.com/ImageMagick/ImageMagick/commit/cea1693e2ded51b4cc91c70c54096cbed1691c00"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9pp9-cfwx-54rm",
          "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9pp9-cfwx-54rm"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00019.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00019.html"
        }
      ],
      "release_date": "2025-10-17T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-32546",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-32546"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2091812",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091812"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23",
          "url": "https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943",
          "url": "https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html"
        }
      ],
      "release_date": "2022-06-16T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-20313",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-20313"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1947019",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947019"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html"
        }
      ],
      "release_date": "2021-05-11T23:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-20312",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-20312"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1946742",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946742"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html"
        }
      ],
      "release_date": "2021-05-11T23:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-57807",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "ImageMagick is free and open-source software used for editing and manipulating digital images. ImageMagick versions lower than 14.8.2 include  insecure functions: SeekBlob(), which permits advancing the stream offset beyond the current end without increasing capacity, and WriteBlob(), which then expands by quantum + length (amortized) instead of offset + length, and copies to data + offset. When offset ≫ extent, the copy targets memory beyond the allocation, producing a deterministic heap write on 64-bit builds. No 2⁶⁴ arithmetic wrap, external delegates, or policy settings are required. This is fixed in version 14.8.2.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-57807"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/commit/077a417a19a5ea8c85559b602754a5b928eef23e",
          "url": "https://github.com/ImageMagick/ImageMagick/commit/077a417a19a5ea8c85559b602754a5b928eef23e"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-23hg-53q6-hqfg",
          "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-23hg-53q6-hqfg"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html"
        }
      ],
      "release_date": "2025-09-05T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ]
    },
    {
      "cve": "CVE-2025-53019",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "ImageMagick is free and open-source software used for editing and manipulating digital images. In versions prior to 7.1.2-0 and 6.9.13-26, in ImageMagick's `magick stream` command, specifying multiple consecutive `%d` format specifiers in a filename template causes a memory leak. Versions 7.1.2-0 and 6.9.13-26 fix the issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-53019"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-cfh4-9f7v-fhrc",
          "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-cfh4-9f7v-fhrc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html"
        }
      ],
      "release_date": "2025-07-14T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-53014",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "ImageMagick is free and open-source software used for editing and manipulating digital images. Versions prior to 7.1.2-0 and 6.9.13-26 have a heap buffer overflow in the `InterpretImageFilename` function. The issue stems from an off-by-one error that causes out-of-bounds memory access when processing format strings containing consecutive percent signs (`%%`). Versions 7.1.2-0 and 6.9.13-26 fix the issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-53014"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-hm4x-r5hc-794f",
          "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-hm4x-r5hc-794f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html"
        }
      ],
      "release_date": "2025-07-14T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ]
    },
    {
      "cve": "CVE-2022-32547",
      "cwe": {
        "id": "CWE-704",
        "name": "Incorrect Type Conversion or Cast"
      },
      "notes": [
        {
          "category": "description",
          "text": "In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-32547"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2091813",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091813"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0",
          "url": "https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b",
          "url": "https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html"
        }
      ],
      "release_date": "2022-06-16T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2020-27768",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2020-27768"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1894689",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894689"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html"
        }
      ],
      "release_date": "2021-02-23T04:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2020-27751",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2020-27751"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1891994",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891994"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html"
        }
      ],
      "release_date": "2020-12-08T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2025-55154",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-27 and 7.1.2-1, the magnified size calculations in ReadOneMNGIMage (in coders/png.c) are unsafe and can overflow, leading to memory corruption. This issue has been patched in versions 6.9.13-27 and 7.1.2-1.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-55154"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qp29-wxp5-wh82",
          "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qp29-wxp5-wh82"
        },
        {
          "category": "external",
          "summary": "https://goo.gle/bigsleep",
          "url": "https://goo.gle/bigsleep"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html"
        }
      ],
      "release_date": "2025-08-13T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-32545",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-32545"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2091811",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091811"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512",
          "url": "https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa",
          "url": "https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html"
        }
      ],
      "release_date": "2022-06-16T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-57803",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-28 and 7.1.2-2 for ImageMagick's 32-bit build, a 32-bit integer overflow in the BMP encoder’s scanline-stride computation collapses bytes_per_line (stride) to a tiny value while the per-row writer still emits 3 × width bytes for 24-bpp images. The row base pointer advances using the (overflowed) stride, so the first row immediately writes past its slot and into adjacent heap memory with attacker-controlled bytes. This is a classic, powerful primitive for heap corruption in common auto-convert pipelines. This issue has been patched in versions 6.9.13-28 and 7.1.2-2.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-57803"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/commit/2c55221f4d38193adcb51056c14cf238fbcc35d7",
          "url": "https://github.com/ImageMagick/ImageMagick/commit/2c55221f4d38193adcb51056c14cf238fbcc35d7"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-mxvv-97wh-cfmm",
          "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-mxvv-97wh-cfmm"
        },
        {
          "category": "external",
          "summary": "https://github.com/dlemstra/Magick.NET/releases/tag/14.8.1",
          "url": "https://github.com/dlemstra/Magick.NET/releases/tag/14.8.1"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html"
        }
      ],
      "release_date": "2025-08-26T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-55298",
      "cwe": {
        "id": "CWE-123",
        "name": "Write-what-where Condition"
      },
      "notes": [
        {
          "category": "description",
          "text": "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to ImageMagick versions 6.9.13-28 and 7.1.2-2, a format string bug vulnerability exists in InterpretImageFilename function where user input is directly passed to FormatLocaleString without proper sanitization. An attacker can overwrite arbitrary memory regions, enabling a wide range of attacks from heap overflow to remote code execution. This issue has been patched in versions 6.9.13-28 and 7.1.2-2.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-55298"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/commit/439b362b93c074eea6c3f834d84982b43ef057d5",
          "url": "https://github.com/ImageMagick/ImageMagick/commit/439b362b93c074eea6c3f834d84982b43ef057d5"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9ccg-6pjw-x645",
          "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9ccg-6pjw-x645"
        },
        {
          "category": "external",
          "summary": "https://github.com/dlemstra/Magick.NET/releases/tag/14.8.1",
          "url": "https://github.com/dlemstra/Magick.NET/releases/tag/14.8.1"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html"
        }
      ],
      "release_date": "2025-08-26T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-55212",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "description",
          "text": "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-28 and 7.1.2-2, passing a geometry string containing only a colon (\":\") to montage -geometry leads GetGeometry() to set width/height to 0. Later, ThumbnailImage() divides by these zero dimensions, triggering a crash (SIGFPE/abort), resulting in a denial of service. This issue has been patched in versions 6.9.13-28 and 7.1.2-2.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-55212"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/blob/0ba1b587be17543b664f7ad538e9e51e0da59d17/MagickCore/geometry.c#L355",
          "url": "https://github.com/ImageMagick/ImageMagick/blob/0ba1b587be17543b664f7ad538e9e51e0da59d17/MagickCore/geometry.c#L355"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/blob/0ba1b587be17543b664f7ad538e9e51e0da59d17/MagickCore/resize.c#L4625-L4629",
          "url": "https://github.com/ImageMagick/ImageMagick/blob/0ba1b587be17543b664f7ad538e9e51e0da59d17/MagickCore/resize.c#L4625-L4629"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/commit/5f0bcf986b8b5e90567750d31a37af502b73f2af",
          "url": "https://github.com/ImageMagick/ImageMagick/commit/5f0bcf986b8b5e90567750d31a37af502b73f2af"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-fh55-q5pj-pxgw",
          "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-fh55-q5pj-pxgw"
        },
        {
          "category": "external",
          "summary": "https://github.com/dlemstra/Magick.NET/releases/tag/14.8.1",
          "url": "https://github.com/dlemstra/Magick.NET/releases/tag/14.8.1"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html"
        }
      ],
      "release_date": "2025-08-26T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-53101",
      "cwe": {
        "id": "CWE-124",
        "name": "Buffer Underwrite ('Buffer Underflow')"
      },
      "notes": [
        {
          "category": "description",
          "text": "ImageMagick is free and open-source software used for editing and manipulating digital images. In versions prior to 7.1.2-0 and 6.9.13-26, in ImageMagick's `magick mogrify` command, specifying multiple consecutive `%d` format specifiers in a filename template causes internal pointer arithmetic to generate an address below the beginning of the stack buffer, resulting in a stack overflow through `vsnprintf()`. Versions 7.1.2-0 and 6.9.13-26 fix the issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-53101"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/commit/66dc8f51c11b0ae1f1cdeacd381c3e9a4de69774",
          "url": "https://github.com/ImageMagick/ImageMagick/commit/66dc8f51c11b0ae1f1cdeacd381c3e9a4de69774"
        },
        {
          "category": "external",
          "summary": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qh3h-j545-h8c9",
          "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qh3h-j545-h8c9"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/09/msg00012.html"
        }
      ],
      "release_date": "2025-07-14T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ]
    },
    {
      "cve": "CVE-2021-20309",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
          "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
          "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-20309"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1946722",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946722"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html"
        }
      ],
      "release_date": "2021-05-11T23:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-12T13:14:10.806234Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248",
          "product_ids": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765545248"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-c++-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.i686",
            "Oracle-Linux-7:ImageMagick-devel-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-doc-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64",
            "Oracle-Linux-7:ImageMagick-perl-0:6.9.10.68-7.0.3.el7_9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}