Debian Package Tracker
Register | Log in
Subscribe

imagemagick

image manipulation programs -- binaries

Choose email to subscribe with

general
  • source: imagemagick (main)
  • version: 8:7.1.2.16+dfsg1-1
  • maintainer: ImageMagick Packaging Team (archive) (DMD)
  • uploaders: Bastien Roucariès [DMD]
  • arch: all any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 8:6.9.11.60+dfsg-1.3+deb11u4
  • o-o-sec: 8:6.9.11.60+dfsg-1.3+deb11u10
  • o-o-p-u: 8:6.9.11.60+dfsg-1.3+deb11u4
  • oldstable: 8:6.9.11.60+dfsg-1.6+deb12u5
  • old-sec: 8:6.9.11.60+dfsg-1.6+deb12u7
  • old-p-u: 8:6.9.11.60+dfsg-1.6+deb12u7
  • stable: 8:7.1.1.43+dfsg1-1+deb13u5
  • stable-sec: 8:7.1.1.43+dfsg1-1+deb13u7
  • stable-p-u: 8:7.1.1.43+dfsg1-1+deb13u6
  • testing: 8:7.1.2.15+dfsg1-2
  • unstable: 8:7.1.2.16+dfsg1-1
versioned links
  • 8:6.9.11.60+dfsg-1.3+deb11u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:6.9.11.60+dfsg-1.3+deb11u10: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:6.9.11.60+dfsg-1.6+deb12u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:6.9.11.60+dfsg-1.6+deb12u7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:7.1.1.43+dfsg1-1+deb13u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:7.1.1.43+dfsg1-1+deb13u6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:7.1.1.43+dfsg1-1+deb13u7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:7.1.2.15+dfsg1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:7.1.2.16+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • imagemagick (56 bugs: 0, 31, 25, 0)
  • imagemagick-7-common
  • imagemagick-7-doc (1 bugs: 0, 1, 0, 0)
  • imagemagick-7.q16 (8 bugs: 0, 4, 4, 0)
  • imagemagick-7.q16hdri
  • libimage-magick-perl (2 bugs: 0, 1, 1, 0)
  • libimage-magick-q16-perl
  • libimage-magick-q16hdri-perl
  • libmagick++-7-headers
  • libmagick++-7.q16-5
  • libmagick++-7.q16-dev
  • libmagick++-7.q16hdri-5
  • libmagick++-7.q16hdri-dev (1 bugs: 0, 1, 0, 0)
  • libmagick++-dev
  • libmagickcore-7-arch-config
  • libmagickcore-7-headers
  • libmagickcore-7.q16-10 (1 bugs: 0, 1, 0, 0)
  • libmagickcore-7.q16-10-extra
  • libmagickcore-7.q16-dev
  • libmagickcore-7.q16hdri-10
  • libmagickcore-7.q16hdri-10-extra
  • libmagickcore-7.q16hdri-dev
  • libmagickcore-dev
  • libmagickwand-7-headers
  • libmagickwand-7.q16-10
  • libmagickwand-7.q16-dev
  • libmagickwand-7.q16hdri-10
  • libmagickwand-7.q16hdri-dev
  • libmagickwand-dev
  • perlmagick
action needed
A new upstream version is available: 7.1.2-17 high
A new upstream version 7.1.2-17 is available, you should consider packaging it.
Created: 2026-03-19 Last update: 2026-03-22 12:00
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2026-32636: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-17 and 6.9.13-42, the NewXMLTree method contains a bug that could result in a crash due to an out of write bounds of a single zero byte. Versions 7.1.2-17 and 6.9.13-42 fix the issue.
Created: 2026-03-10 Last update: 2026-03-20 00:17
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-32636: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-17 and 6.9.13-42, the NewXMLTree method contains a bug that could result in a crash due to an out of write bounds of a single zero byte. Versions 7.1.2-17 and 6.9.13-42 fix the issue.
Created: 2026-03-19 Last update: 2026-03-20 00:17
19 security issues in forky high

There are 19 open security issues in forky.

19 important issues:
  • CVE-2026-28493: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted image. This vulnerability is fixed in 7.1.2-16.
  • CVE-2026-28494: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28686: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28687: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28688: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28689: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28690: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28691: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28692: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28693: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30883: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30929: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30931: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, a heap-based buffer overflow in the UHDR encoder can happen due to truncation of a value and it would allow an out of bounds write. This vulnerability is fixed in 7.1.2-16.
  • CVE-2026-30935: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, BilateralBlurImage contains a heap buffer over-read caused by an incorrect conversion. When processing a crafted image with the -bilateral-blur operation an out of bounds read can occur. This vulnerability is fixed in 7.1.2-16.
  • CVE-2026-30936: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30937: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-31853: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, an overflow on 32-bit systems can cause a crash in the SFW decoder when processing extremely large images. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-32259: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, when a memory allocation fails in the sixel encoder it would be possible to write past the end of a buffer on the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-32636: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-17 and 6.9.13-42, the NewXMLTree method contains a bug that could result in a crash due to an out of write bounds of a single zero byte. Versions 7.1.2-17 and 6.9.13-42 fix the issue.
Created: 2026-03-10 Last update: 2026-03-20 00:17
19 security issues in bullseye high

There are 19 open security issues in bullseye.

19 important issues:
  • CVE-2026-25971: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, Magick fails to check for circular references between two MSLs, leading to a stack overflow. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-25985: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory, leading to an out-of-memory abort. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-26284: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick lacks proper boundary checking when processing Huffman-coded data from PCD (Photo CD) files. The decoder contains an function that has an incorrect initialization that could cause an out of bounds read. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-26983: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the MSL interpreter crashes when processing a invalid `<map>` element that causes it to use an image after it has been freed. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-28494: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28686: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28687: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28688: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28689: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28690: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28691: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28692: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28693: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30883: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30936: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30937: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-31853: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, an overflow on 32-bit systems can cause a crash in the SFW decoder when processing extremely large images. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-32259: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, when a memory allocation fails in the sixel encoder it would be possible to write past the end of a buffer on the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-32636: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-17 and 6.9.13-42, the NewXMLTree method contains a bug that could result in a crash due to an out of write bounds of a single zero byte. Versions 7.1.2-17 and 6.9.13-42 fix the issue.
Created: 2026-02-24 Last update: 2026-03-20 00:17
19 security issues in bookworm high

There are 19 open security issues in bookworm.

18 important issues:
  • CVE-2026-25985: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory, leading to an out-of-memory abort. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-26284: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick lacks proper boundary checking when processing Huffman-coded data from PCD (Photo CD) files. The decoder contains an function that has an incorrect initialization that could cause an out of bounds read. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-26983: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the MSL interpreter crashes when processing a invalid `<map>` element that causes it to use an image after it has been freed. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-28494: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28686: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28687: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28688: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28689: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28690: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28691: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28692: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28693: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30883: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30936: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30937: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-31853: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, an overflow on 32-bit systems can cause a crash in the SFW decoder when processing extremely large images. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-32259: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, when a memory allocation fails in the sixel encoder it would be possible to write past the end of a buffer on the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-32636: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-17 and 6.9.13-42, the NewXMLTree method contains a bug that could result in a crash due to an out of write bounds of a single zero byte. Versions 7.1.2-17 and 6.9.13-42 fix the issue.
1 ignored issue:
  • CVE-2026-25971: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, Magick fails to check for circular references between two MSLs, leading to a stack overflow. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
Created: 2026-02-24 Last update: 2026-03-20 00:17
lintian reports 3 errors and 17 warnings high
Lintian reports 3 errors and 17 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-03-07 Last update: 2026-03-19 12:31
debian/patches: 9 patches with invalid metadata, 8 patches to forward upstream high

Among the 37 debian patches available in version 8:7.1.2.16+dfsg1-1 of the package, we noticed the following issues:

  • 9 patches with invalid metadata that ought to be fixed.
  • 8 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-03-11 11:03
Depends on packages which need a new maintainer normal
The packages that imagemagick depends on which need a new maintainer are:
  • html2ps (#759016)
    • Suggests: html2ps html2ps
Created: 2019-11-22 Last update: 2026-03-22 12:33
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 2-day delay is over. Check why.
Created: 2026-03-13 Last update: 2026-03-22 12:33
1 bug tagged help in the BTS normal
The BTS contains 1 bug tagged help, please consider helping the maintainer in dealing with it.
Created: 2019-03-21 Last update: 2026-03-22 12:30
12 bugs tagged patch in the BTS normal
The BTS contains patches fixing 12 bugs (13 if counting merged bugs), consider including or untagging them.
Created: 2025-01-06 Last update: 2026-03-22 12:30
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 8:7.1.2.17+dfsg1-1, distribution unstable) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit f1a7e8f87fb06a02417212e5f46a6c49b5f9499b
Author: Bastien Roucariès <rouca@debian.org>
Date:   Fri Mar 20 21:51:45 2026 +0100

    New upstream version

commit 3bc60e6d48ca9a07964986ca785d613701b01fa1
Author: Bastien Roucariès <rouca@debian.org>
Date:   Fri Mar 20 21:44:29 2026 +0100

    Refresh patches

commit c834e154f8b2a55985c14cc2f238e17546729d16
Merge: 3149188a 2dea222b
Author: Bastien Roucariès <rouca@debian.org>
Date:   Fri Mar 20 21:43:07 2026 +0100

    Update upstream source from tag 'upstream/7.1.2.17+dfsg1'
    
    Update to upstream version '7.1.2.17+dfsg1'
    with Debian dir ae29fee783711962850e61264b672fd41933018e

commit 3149188abb20bd1316edab2146967c476c3c8c66
Author: Bastien Roucariès <rouca@debian.org>
Date:   Fri Mar 20 21:41:29 2026 +0100

    Remove git dpm

commit 500c8458fcb093f395c310d32e86a74a69daab36
Author: Bastien Roucariès <rouca@debian.org>
Date:   Tue Mar 10 21:48:11 2026 +0100

    Refresh patches

commit f33e3705f57d1c40cd1071661262893045d150cd
Author: Bastien Roucariès <rouca@debian.org>
Date:   Tue Mar 10 21:35:59 2026 +0100

    New upstream release

commit 1aae6211d31c95735d3be839f46474ed2aef4add
Merge: 64885144 b2010657
Author: Bastien Roucariès <rouca@debian.org>
Date:   Tue Mar 10 21:25:34 2026 +0100

    Update upstream source from tag 'upstream/7.1.2.16+dfsg1'
    
    Update to upstream version '7.1.2.16+dfsg1'
    with Debian dir dba1c980ebaa951c202f8f952ae4d03d307c195b

commit 648851448ebebaa181847680c0155dc9bbe9e610
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 18:50:46 2026 +0100

    Improve reproductibility

commit 800ddbab7c840a562a1db66b3e5441cbff003266
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 18:36:13 2026 +0100

    Remove privacy breach

commit 817fb5870a82c88d28cf6ea9f320cfca668a3601
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 18:33:17 2026 +0100

    Remove bootstrap privacy breach

commit 78e03b217ddb36fa7de1b28bb5adefa4ff25c5e1
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 18:31:14 2026 +0100

    New copyright address

commit 53ff9ad00779bf212b0764c468d07c0b425eb176
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 13:46:39 2026 +0100

    Fix copyright address

commit 46f8711e29f5d8f7f29881da5faee7307cc0de59
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 13:43:47 2026 +0100

    Fix a typo

commit 26bbaa70936b57aca8924f4736fd930a6c4129f8
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 13:42:00 2026 +0100

    Avoid a privacy breach due to bootstrap5

commit 681e601f00b8ae8b6802339f1f86e933bc98ea0e
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 13:32:22 2026 +0100

    Allow doxygen to be reproductible

commit 79ff2274659835b4b70f04fe627fa794f28cf68b
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 12:48:18 2026 +0100

    Add c++ symbol from inline of libc++ as optional symbol

commit 40453be047b7ae82327b8bacfe28c0cae8f7b7d7
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 12:41:40 2026 +0100

    Add magick core symbols

commit f9fd96cdcb180ffca92b87c5a23a75254ab07421
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 11:23:03 2026 +0100

    Use version with EPOCH

commit daed0d5fa37502aa253f2d1c2e9d0881d096dc5b
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 02:06:26 2026 +0100

    FIx a double free

commit 3d9a278a81991bd79bccb3293a427baea2617897
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 00:51:30 2026 +0100

    Add changelog

commit 0b9aa0a0d5e4438528f4d26e051e9cd34709a98c
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 00:26:49 2026 +0100

    Refresh patches

commit 2b00c2f13114903551ee3246b2e51ad7a1270033
Merge: 1837f8a9 4ba151fc
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Mar 1 00:25:51 2026 +0100

    Update upstream source from tag 'upstream/7.1.2.15+dfsg1'
    
    Update to upstream version '7.1.2.15+dfsg1'
    with Debian dir 62eb6e06293b40552d98ec36dffdc7996424221c

commit 1837f8a9fd99374a21b605876685b1801fc06128
Author: Bastien Roucariès <rouca@debian.org>
Date:   Wed Jan 21 22:55:13 2026 +0100

    Add changelog

commit 05e42d5f65e348e00e1a4f6f8b5b0cf0fb290be8
Author: Bastien Roucariès <rouca@debian.org>
Date:   Wed Jan 21 22:46:46 2026 +0100

    Refresh patches

commit 26bc0768f0e26796ebf073c5f987b646010dec63
Merge: 4587e68d da9d8f81
Author: Bastien Roucariès <rouca@debian.org>
Date:   Wed Jan 21 22:38:04 2026 +0100

    Update upstream source from tag 'upstream/7.1.2.13+dfsg1'
    
    Update to upstream version '7.1.2.13+dfsg1'
    with Debian dir 1c2380a5551f6d7ae712e8efa03a7eb652d003a2

commit 4587e68d52e19679751bb58cd9ff01786a4f68fb
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Dec 28 20:05:58 2025 +0100

    Add changelog

commit 67f81c852f452ce9b4c6a1e43a22e514ef194abf
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Dec 28 19:34:43 2025 +0100

    Refresh pateches

commit dae387c80f114673fee5903002a8f49cfba2c955
Merge: 1bad46da be459f4a
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Dec 28 19:30:38 2025 +0100

    Update upstream source from tag 'upstream/7.1.2.12+dfsg1'
    
    Update to upstream version '7.1.2.12+dfsg1'
    with Debian dir 2f2bdb48fb7d1ea43ed4ffae96680a1f6503754a

commit 1bad46daa22212aa178e5df3510b6eb76a10f7b8
Author: Bastien Roucariès <rouca@debian.org>
Date:   Tue Oct 28 17:07:04 2025 +0100

    Refresh patches

commit 520d3abdff8d92243f145d13361d730828e98e6d
Author: Bastien Roucariès <rouca@debian.org>
Date:   Tue Oct 28 17:06:26 2025 +0100

    Update changelog

commit 390fb315e32c79a5dd6fc7fbb6c1b5dabd9a36a2
Merge: a0ef81ab f50a4571
Author: Bastien Roucariès <rouca@debian.org>
Date:   Tue Oct 28 16:07:23 2025 +0100

    Update upstream source from tag 'upstream/7.1.2.8+dfsg1'
    
    Update to upstream version '7.1.2.8+dfsg1'
    with Debian dir 7103002db102134f2d0792e40b149cf81d8d8ab5

commit a0ef81abec7c0b1d4d49e05a2921bbf43db714cf
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Oct 18 12:35:22 2025 +0200

    Firx remaining html error

commit 83b794346ebbdbd58a3c285ad2b8ab877c42f889
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Oct 18 12:21:13 2025 +0200

    Fix html sane rule

commit 3d015fd43553a516d8355874366f97405489b161
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Oct 18 11:59:55 2025 +0200

    Refresh patches

commit f38cdc4383c271e50e4455232fa15a2b993a9b18
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Oct 18 11:57:38 2025 +0200

    Finalize changelog

commit e9c823f4cda227c0eebdc0936261da621fee5fec
Merge: 318a24a7 ef30f27a
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Oct 18 11:55:03 2025 +0200

    Update upstream source from tag 'upstream/7.1.2.7+dfsg1'
    
    Update to upstream version '7.1.2.7+dfsg1'
    with Debian dir 2d36596aee2ba2d63f9e931901570fadd2b92132

commit 318a24a7133f26843d53a459feca4149fff6a937
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Sep 6 16:33:16 2025 +0200

    Refresh patches

commit 598d2ab86d5dc9127b1c7a269a5641e4441121ee
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Sep 6 16:28:16 2025 +0200

    Add new CVE fix

commit eeaa4828605f503ba24eeef773bff7a7406257ff
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Sep 6 15:44:25 2025 +0200

    Add index.html to make deps

commit af0897e285d0dd0c785bdc9e2508f613f97a8157
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Sep 6 14:48:01 2025 +0200

    Fix index.html link

commit 27d30c815bf0b8839ac16741a71cc5fcdd2f9fc2
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sat Sep 6 01:45:54 2025 +0200

    Add changelog entry

commit 709392d0f92e00579bdaef2b1b9efcd0d4b1c73b
Author: Bastien Roucariès <rouca@debian.org>
Date:   Fri Sep 5 23:44:39 2025 +0200

    refresh patch

commit d964e6d730ba3617392177ba1bb4e5947cd0c520
Merge: 4bddb840 70383fab
Author: Bastien Roucariès <rouca@debian.org>
Date:   Fri Sep 5 23:24:42 2025 +0200

    Update upstream source from tag 'upstream/7.1.2.3+dfsg1'
    
    Update to upstream version '7.1.2.3+dfsg1'
    with Debian dir 91ab2b6f25cec935bfeed09c560262b7dcc9d20a

commit 4bddb8409dfe291d13a4cb02e57aefc356814107
Author: Bastien Roucariès <rouca@debian.org>
Date:   Mon Aug 18 19:19:48 2025 +0200

    Add conflicts

commit 3ff2bfa8310b9360606d313b878fded6f15d3e9f
Author: Bastien Roucariès <rouca@debian.org>
Date:   Mon Aug 18 14:35:31 2025 +0200

    Add missing symbols

commit 59a2d687b2621773ce9253d70c67740f2dd4237a
Author: Bastien Roucariès <rouca@debian.org>
Date:   Mon Aug 18 00:07:57 2025 +0200

    Fix html error

commit a9d310406b5187078682f3d0e06e377e2767c2a9
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Aug 17 22:16:39 2025 +0200

    Remove index.html at repack

commit b38a711705e19df9e991787e37816830bc9701a8
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Aug 17 22:15:08 2025 +0200

    Remove index.html use symbolic link

commit ea6c0f072f19a4d30d55347f761e7e3950c11172
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Aug 17 22:09:51 2025 +0200

    Improve check for privacy breach

commit 5e58fe49e369ed7b28a98f52f8023a3de02b7057
Author: Bastien Roucariès <rouca@debian.org>
Date:   Sun Aug 17 18:54:46 2025 +0200

    New upstream version
Created: 2026-03-20 Last update: 2026-03-22 00:32
3 open merge requests in Salsa normal
There are 3 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2026-03-08 Last update: 2026-03-08 17:02
AppStream hints: 2 warnings for imagemagick-7.q16hdri,imagemagick-7.q16 normal
AppStream found metadata issues for packages:
  • imagemagick-7.q16: 1 warning
  • imagemagick-7.q16hdri: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2020-06-01 Last update: 2024-12-29 23:00
RFH: The maintainer is looking for help with this package. normal
The current maintainer is looking for someone who can help with the maintenance of this package. If you are interested in this package, please consider helping out. One way you can help is offer to be a co-maintainer or triage bugs in the BTS. Please see bug number #1017366 for more information.
Created: 2022-08-15 Last update: 2022-08-15 02:06
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.0).
Created: 2025-02-21 Last update: 2026-03-11 05:30
testing migrations
  • This package is part of the ongoing testing transition known as auto-openexr. Please avoid uploads unrelated to this transition, they would likely delay it and require supplementary work from the release managers. On the other hand, if your package has problems preventing it to migrate to testing, please fix them as soon as possible. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • This package will soon be part of the auto-libraw transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migrates after: openexr
    • Migration status for imagemagick (8:7.1.2.15+dfsg1-2 to 8:7.1.2.16+dfsg1-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for cimg/3.5.2+dfsg-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Test triggered (failure will be ignored), s390x: Pass
    • ∙ ∙ Autopkgtest for imagemagick/8:7.1.2.16+dfsg1-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for libreoffice/4:26.2.1-1: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Test triggered (failure will be ignored), ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Autopkgtest for ruby-rmagick/6.0.1-3: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Failed (not a regression) ♻ (reference ♻), ppc64el: Regression ♻ (reference ♻), riscv64: Regression ♻ (reference ♻), s390x: Regression ♻ (reference ♻)
    • ∙ ∙ Depends: imagemagick openexr (not considered)
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/i/imagemagick.html
    • ∙ ∙ Reproduced on amd64
    • ∙ ∙ Reproduced on arm64
    • ∙ ∙ Reproduced on armhf
    • ∙ ∙ Reproduced on i386
    • ∙ ∙ Reproducibility check waiting for results on ppc64el
    • ∙ ∙ 11 days old (needed 2 days)
    • Not considered
news
[rss feed]
  • [2026-03-19] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u7 (source) into stable-security (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-03-14] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u6 (source) into proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-03-13] Accepted imagemagick 8:6.9.11.60+dfsg-1.6+deb12u7 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-03-11] Accepted imagemagick 8:6.9.11.60+dfsg-1.3+deb11u10 (source) into oldoldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-03-10] Accepted imagemagick 8:7.1.2.16+dfsg1-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-03-10] Accepted imagemagick 8:6.9.11.60+dfsg-1.6+deb12u7 (source) into oldstable-security (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-03-09] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u6 (source) into stable-security (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-03-09] imagemagick 8:7.1.2.15+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2026-03-07] imagemagick 8:7.1.2.15+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-06] Accepted imagemagick 8:7.1.2.15+dfsg1-2 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-03-01] Accepted imagemagick 8:7.1.2.15+dfsg1-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-01-29] Accepted imagemagick 8:6.9.11.60+dfsg-1.6+deb12u6 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-01-29] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u5 (source) into proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-01-26] Accepted imagemagick 8:6.9.11.60+dfsg-1.6+deb12u6 (source) into oldstable-security (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-01-26] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u5 (source) into stable-security (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-01-25] imagemagick 8:7.1.2.13+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-24] Accepted imagemagick 8:6.9.11.60+dfsg-1.3+deb11u9 (source) into oldoldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-01-21] Accepted imagemagick 8:7.1.2.13+dfsg1-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-01-16] imagemagick 8:7.1.2.12+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-03] Accepted imagemagick 8:6.9.11.60+dfsg-1.6+deb12u5 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-01-03] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u4 (source) into proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2025-12-31] Accepted imagemagick 8:6.9.11.60+dfsg-1.3+deb11u8 (source) into oldoldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-12-28] Accepted imagemagick 8:7.1.2.12+dfsg1-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-11-16] imagemagick 8:7.1.2.8+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-02] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u3 (source) into proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2025-10-28] Accepted imagemagick 8:7.1.2.8+dfsg1-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-10-19] Accepted imagemagick 8:6.9.11.60+dfsg-1.3+deb11u7 (source) into oldoldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-10-18] Accepted imagemagick 8:7.1.2.7+dfsg1-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-09-15] Accepted imagemagick 8:6.9.11.60+dfsg-1.6+deb12u4 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2025-09-12] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • 1
  • 2
bugs [bug history graph]
  • all: 127 130
  • RC: 0
  • I&N: 78 79
  • M&W: 48 50
  • F&P: 1
  • patch: 12 13
  • help: 1
  • NC: 1
links
  • homepage
  • lintian (3, 17)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 8:7.1.2.15+dfsg1-1
  • 100 bugs (1 patch)

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing