CVE-2025-65955

Source
https://cve.org/CVERecord?id=CVE-2025-65955
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-65955.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-65955
Aliases
Downstream
Published
2025-12-02T23:02:58.856Z
Modified
2026-01-14T08:25:29.480991Z
Severity
  • 4.9 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
ImageMagick has a use-after-free/double-free risk in Options::fontFamily when clearing family
Details

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/65xxx/CVE-2025-65955.json",
    "cwe_ids": [
        "CWE-415",
        "CWE-416"
    ]
}
References

Affected packages

Git / github.com/imagemagick/imagemagick

Affected ranges

Type
GIT
Repo
https://github.com/imagemagick/imagemagick
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-65955.json"

vanir_signatures

[
    {
        "source": "https://github.com/imagemagick/imagemagick/commit/6409f34d637a34a1c643632aa849371ec8b3b5a8",
        "id": "CVE-2025-65955-0d1ae814",
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "MagickWand/mogrify.c"
        },
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "190481630504674235377941817915215661061",
                "43599292016995932995905311447961076755",
                "90053385351275835004026485915755642334",
                "28571416119094355070783996500128087243"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://github.com/imagemagick/imagemagick/commit/6409f34d637a34a1c643632aa849371ec8b3b5a8",
        "id": "CVE-2025-65955-0ff505c9",
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "Magick++/lib/Image.cpp"
        },
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "90225864509631457081905037777006003333",
                "294072310811700088047597965393073734983",
                "59289005089632199450500124492108195183"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://github.com/imagemagick/imagemagick/commit/6409f34d637a34a1c643632aa849371ec8b3b5a8",
        "id": "CVE-2025-65955-391d10c9",
        "signature_type": "Function",
        "signature_version": "v1",
        "target": {
            "file": "MagickWand/mogrify.c",
            "function": "MogrifyImageInfo"
        },
        "deprecated": false,
        "digest": {
            "function_hash": "212212465426472466726167002992835247456",
            "length": 21990.0
        }
    },
    {
        "source": "https://github.com/imagemagick/imagemagick/commit/6409f34d637a34a1c643632aa849371ec8b3b5a8",
        "id": "CVE-2025-65955-3a10de04",
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "MagickCore/draw.c"
        },
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "37342179605124680902401738289266283587",
                "47997997723597720245939242920126965858",
                "124913685409147088353134674310504897733",
                "70312978894727939740191532771355455028"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://github.com/imagemagick/imagemagick/commit/6f81eb15f822ad86e8255be75efad6f9762c32f8",
        "id": "CVE-2025-65955-6bc103dc",
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "Magick++/lib/Options.cpp"
        },
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "72432470263635887114496177689452338123",
                "197041434945087605973817451982168963770",
                "117720230687322663635504847411889752494",
                "60230879242306243520302367922157632486"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://github.com/imagemagick/imagemagick/commit/6409f34d637a34a1c643632aa849371ec8b3b5a8",
        "id": "CVE-2025-65955-b348bcb5",
        "signature_type": "Function",
        "signature_version": "v1",
        "target": {
            "file": "MagickCore/draw.c",
            "function": "GetDrawInfo"
        },
        "deprecated": false,
        "digest": {
            "function_hash": "106265010585496985434694031334024915376",
            "length": 3366.0
        }
    },
    {
        "source": "https://github.com/imagemagick/imagemagick/commit/6409f34d637a34a1c643632aa849371ec8b3b5a8",
        "id": "CVE-2025-65955-ba53d4a8",
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "Magick++/lib/Magick++/Image.h"
        },
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "322054083635948453416300779418841408551",
                "273952746082768830393752109147054165765",
                "137840809942740176678677164495861853552"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://github.com/imagemagick/imagemagick/commit/6409f34d637a34a1c643632aa849371ec8b3b5a8",
        "id": "CVE-2025-65955-bca84aff",
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "Magick++/lib/Options.cpp"
        },
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "162272539969577556621940690850093434871",
                "152914210971778292371710229425749338293",
                "158810812580211878811074774350937395740"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://github.com/imagemagick/imagemagick/commit/6409f34d637a34a1c643632aa849371ec8b3b5a8",
        "id": "CVE-2025-65955-de4ff2ff",
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "Magick++/lib/Magick++/Options.h"
        },
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "71933277940106397954067346869831400309",
                "299085479059047341930295436586762427954",
                "339843267778265026840747496163444535879"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://github.com/imagemagick/imagemagick/commit/6f81eb15f822ad86e8255be75efad6f9762c32f8",
        "id": "CVE-2025-65955-fc9471c3",
        "signature_type": "Function",
        "signature_version": "v1",
        "target": {
            "file": "Magick++/lib/Options.cpp",
            "function": "Magick::Options::fontFamily"
        },
        "deprecated": false,
        "digest": {
            "function_hash": "167484139931766564707917583714750802165",
            "length": 355.0
        }
    }
]

Git / github.com/imagemagick/imagemagick6

Affected ranges

Type
GIT
Repo
https://github.com/imagemagick/imagemagick6
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

6.*

6.9.10-0
6.9.10-1
6.9.10-10
6.9.10-11
6.9.10-12
6.9.10-13
6.9.10-14
6.9.10-15
6.9.10-16
6.9.10-17
6.9.10-18
6.9.10-19
6.9.10-2
6.9.10-20
6.9.10-21
6.9.10-22
6.9.10-23
6.9.10-24
6.9.10-25
6.9.10-26
6.9.10-27
6.9.10-28
6.9.10-29
6.9.10-3
6.9.10-30
6.9.10-31
6.9.10-32
6.9.10-33
6.9.10-34
6.9.10-35
6.9.10-36
6.9.10-37
6.9.10-38
6.9.10-39
6.9.10-4
6.9.10-40
6.9.10-41
6.9.10-42
6.9.10-43
6.9.10-44
6.9.10-45
6.9.10-46
6.9.10-47
6.9.10-48
6.9.10-49
6.9.10-5
6.9.10-50
6.9.10-51
6.9.10-52
6.9.10-53
6.9.10-54
6.9.10-55
6.9.10-56
6.9.10-57
6.9.10-58
6.9.10-59
6.9.10-6
6.9.10-60
6.9.10-61
6.9.10-62
6.9.10-63
6.9.10-64
6.9.10-65
6.9.10-66
6.9.10-67
6.9.10-68
6.9.10-69
6.9.10-7
6.9.10-70
6.9.10-71
6.9.10-72
6.9.10-73
6.9.10-74
6.9.10-75
6.9.10-77
6.9.10-78
6.9.10-79
6.9.10-8
6.9.10-80
6.9.10-81
6.9.10-82
6.9.10-83
6.9.10-84
6.9.10-85
6.9.10-86
6.9.10-87
6.9.10-88
6.9.10-89
6.9.10-9
6.9.10-90
6.9.10-91
6.9.10-92
6.9.10-93
6.9.10-94
6.9.10-95
6.9.10-96
6.9.10-97
6.9.11-0
6.9.11-1
6.9.11-10
6.9.11-11
6.9.11-12
6.9.11-13
6.9.11-14
6.9.11-15
6.9.11-16
6.9.11-17
6.9.11-18
6.9.11-19
6.9.11-2
6.9.11-20
6.9.11-21
6.9.11-22
6.9.11-23
6.9.11-24
6.9.11-25
6.9.11-26
6.9.11-27
6.9.11-28
6.9.11-29
6.9.11-3
6.9.11-30
6.9.11-31
6.9.11-32
6.9.11-33
6.9.11-34
6.9.11-35
6.9.11-36
6.9.11-37
6.9.11-38
6.9.11-39
6.9.11-4
6.9.11-40
6.9.11-41
6.9.11-42
6.9.11-43
6.9.11-44
6.9.11-45
6.9.11-46
6.9.11-47
6.9.11-48
6.9.11-49
6.9.11-5
6.9.11-50
6.9.11-51
6.9.11-52
6.9.11-53
6.9.11-54
6.9.11-55
6.9.11-56
6.9.11-57
6.9.11-59
6.9.11-6
6.9.11-60
6.9.11-61
6.9.11-62
6.9.11-7
6.9.11-8
6.9.11-9
6.9.12-0
6.9.12-1
6.9.12-10
6.9.12-11
6.9.12-12
6.9.12-14
6.9.12-15
6.9.12-16
6.9.12-17
6.9.12-18
6.9.12-19
6.9.12-2
6.9.12-20
6.9.12-21
6.9.12-22
6.9.12-23
6.9.12-24
6.9.12-25
6.9.12-26
6.9.12-27
6.9.12-28
6.9.12-29
6.9.12-3
6.9.12-30
6.9.12-31
6.9.12-32
6.9.12-33
6.9.12-34
6.9.12-35
6.9.12-36
6.9.12-37
6.9.12-38
6.9.12-39
6.9.12-4
6.9.12-40
6.9.12-41
6.9.12-42
6.9.12-43
6.9.12-44
6.9.12-45
6.9.12-46
6.9.12-47
6.9.12-48
6.9.12-49
6.9.12-5
6.9.12-50
6.9.12-51
6.9.12-52
6.9.12-53
6.9.12-54
6.9.12-55
6.9.12-56
6.9.12-57
6.9.12-58
6.9.12-59
6.9.12-6
6.9.12-60
6.9.12-61
6.9.12-62
6.9.12-63
6.9.12-64
6.9.12-65
6.9.12-66
6.9.12-67
6.9.12-68
6.9.12-69
6.9.12-7
6.9.12-70
6.9.12-71
6.9.12-72
6.9.12-73
6.9.12-74
6.9.12-75
6.9.12-76
6.9.12-77
6.9.12-78
6.9.12-79
6.9.12-8
6.9.12-80
6.9.12-81
6.9.12-82
6.9.12-83
6.9.12-84
6.9.12-85
6.9.12-86
6.9.12-87
6.9.12-88
6.9.12-89
6.9.12-9
6.9.12-90
6.9.12-91
6.9.12-92
6.9.12-93
6.9.12-94
6.9.12-95
6.9.12-96
6.9.12-97
6.9.12-98
6.9.12-99
6.9.13-0
6.9.13-1
6.9.13-10
6.9.13-11
6.9.13-12
6.9.13-13
6.9.13-14
6.9.13-15
6.9.13-16
6.9.13-17
6.9.13-18
6.9.13-19
6.9.13-2
6.9.13-21
6.9.13-22
6.9.13-23
6.9.13-24
6.9.13-25
6.9.13-26
6.9.13-27
6.9.13-28
6.9.13-29
6.9.13-3
6.9.13-30
6.9.13-31
6.9.13-32
6.9.13-33
6.9.13-4
6.9.13-5
6.9.13-6
6.9.13-7
6.9.13-8
6.9.13-9
6.9.4-0
6.9.4-1
6.9.4-10
6.9.4-2
6.9.4-3
6.9.4-4
6.9.4-5
6.9.4-6
6.9.4-7
6.9.4-8
6.9.4-9
6.9.5-0
6.9.5-1
6.9.5-10
6.9.5-2
6.9.5-3
6.9.5-4
6.9.5-5
6.9.5-6
6.9.5-7
6.9.5-8
6.9.5-9
6.9.6-0
6.9.6-1
6.9.6-2
6.9.6-3
6.9.6-4
6.9.6-5
6.9.6-6
6.9.6-7
6.9.6-8
6.9.7-0
6.9.7-1
6.9.7-10
6.9.7-2
6.9.7-3
6.9.7-4
6.9.7-5
6.9.7-6
6.9.7-7
6.9.7-8
6.9.7-9
6.9.8-0
6.9.8-1
6.9.8-10
6.9.8-2
6.9.8-3
6.9.8-4
6.9.8-5
6.9.8-6
6.9.8-7
6.9.8-8
6.9.8-9
6.9.9-0
6.9.9-1
6.9.9-10
6.9.9-11
6.9.9-12
6.9.9-13
6.9.9-14
6.9.9-15
6.9.9-17
6.9.9-18
6.9.9-19
6.9.9-2
6.9.9-20
6.9.9-21
6.9.9-22
6.9.9-23
6.9.9-24
6.9.9-25
6.9.9-26
6.9.9-27
6.9.9-28
6.9.9-29
6.9.9-3
6.9.9-30
6.9.9-31
6.9.9-32
6.9.9-33
6.9.9-34
6.9.9-35
6.9.9-36
6.9.9-37
6.9.9-38
6.9.9-39
6.9.9-4
6.9.9-40
6.9.9-41
6.9.9-42
6.9.9-43
6.9.9-44
6.9.9-45
6.9.9-46
6.9.9-47
6.9.9-48
6.9.9-49
6.9.9-5
6.9.9-50
6.9.9-51
6.9.9-6
6.9.9-7
6.9.9-8
6.9.9-9

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-65955.json"