{
  "threat_severity" : "Moderate",
  "public_date" : "2026-02-24T01:35:36Z",
  "bugzilla" : {
    "description" : "ImageMagick: ImageMagick: Memory corruption and denial of service via signed integer overflow in SIXEL decoder.",
    "id" : "2442108",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2442108"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
    "status" : "draft"
  },
  "cwe" : "CWE-190",
  "details" : [ "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file. The vulnerability occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows. Versions 7.1.2-15 and 6.9.13-40 contain a patch.", "A flaw was found in ImageMagick. A remote attacker can exploit a signed integer overflow vulnerability in the SIXEL decoder by providing a maliciously crafted SIXEL image file. This vulnerability occurs during buffer reallocation operations and can lead to memory corruption and a denial of service (DoS) condition." ],
  "statement" : "This MODERATE impact vulnerability in ImageMagick's SIXEL decoder can lead to memory corruption and denial of service. It affects Red Hat Enterprise Linux 6 ELS and 7 ELS when processing a specially crafted SIXEL image file. Exploitation requires an attacker to provide a malicious image for processing.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "ImageMagick",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "ImageMagick",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-25970\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-25970\nhttps://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-xg29-8ghv-v4xr" ],
  "name" : "CVE-2026-25970",
  "mitigation" : {
    "value" : "To mitigate this vulnerability, avoid processing untrusted SIXEL image files with ImageMagick. If ImageMagick is used in an environment where it processes external or untrusted input, consider implementing sandboxing mechanisms to limit the potential impact of a successful exploit.",
    "lang" : "en:us"
  },
  "csaw" : false
}