Debian Package Tracker
Register | Log in
Subscribe

imagemagick

image manipulation programs -- binaries

Choose email to subscribe with

general
  • source: imagemagick (main)
  • version: 8:7.1.2.16+dfsg1-1
  • maintainer: ImageMagick Packaging Team (archive) (DMD)
  • uploaders: Bastien Roucariès [DMD]
  • arch: all any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 8:6.9.11.60+dfsg-1.3+deb11u4
  • o-o-sec: 8:6.9.11.60+dfsg-1.3+deb11u10
  • o-o-p-u: 8:6.9.11.60+dfsg-1.3+deb11u4
  • oldstable: 8:6.9.11.60+dfsg-1.6+deb12u5
  • old-sec: 8:6.9.11.60+dfsg-1.6+deb12u7
  • old-p-u: 8:6.9.11.60+dfsg-1.6+deb12u6
  • stable: 8:7.1.1.43+dfsg1-1+deb13u4
  • stable-sec: 8:7.1.1.43+dfsg1-1+deb13u6
  • stable-p-u: 8:7.1.1.43+dfsg1-1+deb13u5
  • testing: 8:7.1.2.15+dfsg1-2
  • unstable: 8:7.1.2.16+dfsg1-1
versioned links
  • 8:6.9.11.60+dfsg-1.3+deb11u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:6.9.11.60+dfsg-1.3+deb11u10: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:6.9.11.60+dfsg-1.6+deb12u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:6.9.11.60+dfsg-1.6+deb12u6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:6.9.11.60+dfsg-1.6+deb12u7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:7.1.1.43+dfsg1-1+deb13u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:7.1.1.43+dfsg1-1+deb13u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:7.1.1.43+dfsg1-1+deb13u6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:7.1.2.15+dfsg1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8:7.1.2.16+dfsg1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • imagemagick (56 bugs: 0, 31, 25, 0)
  • imagemagick-7-common
  • imagemagick-7-doc (1 bugs: 0, 1, 0, 0)
  • imagemagick-7.q16 (8 bugs: 0, 4, 4, 0)
  • imagemagick-7.q16hdri
  • libimage-magick-perl (2 bugs: 0, 1, 1, 0)
  • libimage-magick-q16-perl
  • libimage-magick-q16hdri-perl
  • libmagick++-7-headers
  • libmagick++-7.q16-5
  • libmagick++-7.q16-dev
  • libmagick++-7.q16hdri-5
  • libmagick++-7.q16hdri-dev (1 bugs: 0, 1, 0, 0)
  • libmagick++-dev
  • libmagickcore-7-arch-config
  • libmagickcore-7-headers
  • libmagickcore-7.q16-10 (1 bugs: 0, 1, 0, 0)
  • libmagickcore-7.q16-10-extra
  • libmagickcore-7.q16-dev
  • libmagickcore-7.q16hdri-10
  • libmagickcore-7.q16hdri-10-extra
  • libmagickcore-7.q16hdri-dev
  • libmagickcore-dev
  • libmagickwand-7-headers
  • libmagickwand-7.q16-10
  • libmagickwand-7.q16-dev
  • libmagickwand-7.q16hdri-10
  • libmagickwand-7.q16hdri-dev
  • libmagickwand-dev
  • perlmagick
action needed
16 security issues in trixie high

There are 16 open security issues in trixie.

16 important issues:
  • CVE-2026-28493: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted image. This vulnerability is fixed in 7.1.2-16.
  • CVE-2026-28494: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28686: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28687: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28688: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28689: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28690: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28691: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28692: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28693: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30883: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30929: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30931: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, a heap-based buffer overflow in the UHDR encoder can happen due to truncation of a value and it would allow an out of bounds write. This vulnerability is fixed in 7.1.2-16.
  • CVE-2026-30935: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, BilateralBlurImage contains a heap buffer over-read caused by an incorrect conversion. When processing a crafted image with the -bilateral-blur operation an out of bounds read can occur. This vulnerability is fixed in 7.1.2-16.
  • CVE-2026-30936: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30937: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
Created: 2026-03-10 Last update: 2026-03-11 23:30
16 security issues in forky high

There are 16 open security issues in forky.

16 important issues:
  • CVE-2026-28493: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted image. This vulnerability is fixed in 7.1.2-16.
  • CVE-2026-28494: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28686: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28687: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28688: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28689: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28690: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28691: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28692: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28693: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30883: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30929: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30931: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, a heap-based buffer overflow in the UHDR encoder can happen due to truncation of a value and it would allow an out of bounds write. This vulnerability is fixed in 7.1.2-16.
  • CVE-2026-30935: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, BilateralBlurImage contains a heap buffer over-read caused by an incorrect conversion. When processing a crafted image with the -bilateral-blur operation an out of bounds read can occur. This vulnerability is fixed in 7.1.2-16.
  • CVE-2026-30936: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30937: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
Created: 2026-03-10 Last update: 2026-03-11 23:30
19 security issues in bullseye high

There are 19 open security issues in bullseye.

19 important issues:
  • CVE-2026-25966: ImageMagick is free and open-source software used for editing and manipulating digital images. The shipped "secure" security policy includes a rule intended to prevent reading/writing from standard streams. However, ImageMagick also supports fd:<n> pseudo-filenames (e.g., fd:0, fd:1). Prior to versions 7.1.2-15 and 6.9.13-40, this path form is not blocked by the secure policy templates, and therefore bypasses the protection goal of "no stdin/stdout." Versions 7.1.2-15 and 6.9.13-40 contain a patch by including a change to the more secure policies by default. As a workaround, add the change to one's security policy manually.
  • CVE-2026-25971: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, Magick fails to check for circular references between two MSLs, leading to a stack overflow. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-25985: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory, leading to an out-of-memory abort. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-26284: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick lacks proper boundary checking when processing Huffman-coded data from PCD (Photo CD) files. The decoder contains an function that has an incorrect initialization that could cause an out of bounds read. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-26983: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the MSL interpreter crashes when processing a invalid `<map>` element that causes it to use an image after it has been freed. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-28493: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted image. This vulnerability is fixed in 7.1.2-16.
  • CVE-2026-28494: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28686: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28687: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28688: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28689: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28690: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28691: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28692: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28693: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30883: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30929: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30936: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30937: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
Created: 2026-02-24 Last update: 2026-03-11 23:30
19 security issues in bookworm high

There are 19 open security issues in bookworm.

19 important issues:
  • CVE-2026-25966: ImageMagick is free and open-source software used for editing and manipulating digital images. The shipped "secure" security policy includes a rule intended to prevent reading/writing from standard streams. However, ImageMagick also supports fd:<n> pseudo-filenames (e.g., fd:0, fd:1). Prior to versions 7.1.2-15 and 6.9.13-40, this path form is not blocked by the secure policy templates, and therefore bypasses the protection goal of "no stdin/stdout." Versions 7.1.2-15 and 6.9.13-40 contain a patch by including a change to the more secure policies by default. As a workaround, add the change to one's security policy manually.
  • CVE-2026-25971: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, Magick fails to check for circular references between two MSLs, leading to a stack overflow. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-25985: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory, leading to an out-of-memory abort. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-26284: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick lacks proper boundary checking when processing Huffman-coded data from PCD (Photo CD) files. The decoder contains an function that has an incorrect initialization that could cause an out of bounds read. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-26983: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the MSL interpreter crashes when processing a invalid `<map>` element that causes it to use an image after it has been freed. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
  • CVE-2026-28493: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted image. This vulnerability is fixed in 7.1.2-16.
  • CVE-2026-28494: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28686: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28687: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28688: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28689: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28690: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28691: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28692: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-28693: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30883: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30929: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30936: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
  • CVE-2026-30937: ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
Created: 2026-02-24 Last update: 2026-03-11 23:30
debian/patches: 9 patches with invalid metadata, 8 patches to forward upstream high

Among the 37 debian patches available in version 8:7.1.2.16+dfsg1-1 of the package, we noticed the following issues:

  • 9 patches with invalid metadata that ought to be fixed.
  • 8 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-03-11 11:03
lintian reports 3 errors and 17 warnings high
Lintian reports 3 errors and 17 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-03-07 Last update: 2026-03-07 09:00
1 bug tagged help in the BTS normal
The BTS contains 1 bug tagged help, please consider helping the maintainer in dealing with it.
Created: 2019-03-21 Last update: 2026-03-12 06:30
12 bugs tagged patch in the BTS normal
The BTS contains patches fixing 12 bugs (13 if counting merged bugs), consider including or untagging them.
Created: 2025-01-06 Last update: 2026-03-12 06:30
Depends on packages which need a new maintainer normal
The packages that imagemagick depends on which need a new maintainer are:
  • html2ps (#759016)
    • Suggests: html2ps html2ps
Created: 2019-11-22 Last update: 2026-03-12 05:03
3 open merge requests in Salsa normal
There are 3 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2026-03-08 Last update: 2026-03-08 17:02
AppStream hints: 2 warnings for imagemagick-7.q16hdri,imagemagick-7.q16 normal
AppStream found metadata issues for packages:
  • imagemagick-7.q16: 1 warning
  • imagemagick-7.q16hdri: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2020-06-01 Last update: 2024-12-29 23:00
RFH: The maintainer is looking for help with this package. normal
The current maintainer is looking for someone who can help with the maintenance of this package. If you are interested in this package, please consider helping out. One way you can help is offer to be a co-maintainer or triage bugs in the BTS. Please see bug number #1017366 for more information.
Created: 2022-08-15 Last update: 2022-08-15 02:06
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.0).
Created: 2025-02-21 Last update: 2026-03-11 05:30
testing migrations
  • This package will soon be part of the auto-libraw transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migration status for imagemagick (8:7.1.2.15+dfsg1-2 to 8:7.1.2.16+dfsg1-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for agenda.app/0.47-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for asymptote/3.09+ds-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for auto-multiple-choice/1.7.0-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for bambam/1.4.1+dfsg-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered (will not be considered a regression) ♻ (reference ♻)
    • ∙ ∙ Autopkgtest for beads/1.1.22+ds-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for beets/2.5.1-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for blockdiag/3.0.0+dfsg-5: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for breathe/4.36.0-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for cct/1:1.0.3-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for cimg/3.5.2+dfsg-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for diffoscope/313: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered (failure will be ignored), s390x: Test triggered (failure will be ignored)
    • ∙ ∙ Autopkgtest for dogtail/1.0.7-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for drawtiming/0.7.1-11: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for farbfeld/4-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for gajim/2.4.4-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for game-data-packager/87: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for gff2aplot/2.0-15: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for gnumed-client/1.8.23+dfsg-1: amd64: No tests, superficial or marked flaky ♻ (reference ♻), arm64: No tests, superficial or marked flaky ♻ (reference ♻), i386: No tests, superficial or marked flaky ♻ (reference ♻), ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for gnustep-gui/0.32.0-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for gscan2pdf/2.13.5-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for hevea/2.36-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for html2ps/1.0b7-7: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for ikiwiki/3.20260201-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for ikiwiki-hosting/0.20220717-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for imagemagick/8:7.1.2.16+dfsg1-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for img2pdf/0.6.2-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for jmagick/6.7.8-5: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for latexml/0.8.8-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for lebiniou/3.67.0-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for lemonldap-ng/2.22.2+ds-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libgd-graph-perl/1.56~ds-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libgd-securityimage-perl/1.75-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libgraph-writer-dsm-perl/0.008-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libgtk3-imageview-perl/12-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libimage-sane-perl/5-2: amd64: Failed (not a regression) ♻ (reference ♻), arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libopengl-image-perl/1.03-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libopenshot/0.5.0+dfsg1-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libpdf-builder-perl/3.028-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for librecaptcha/0.7.3-1: amd64: No tests, superficial or marked flaky ♻ (reference ♻), arm64: No tests, superficial or marked flaky ♻ (reference ♻), i386: No tests, superficial or marked flaky ♻ (reference ♻), ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for libreoffice/4:26.2.1-1: amd64: Pass, arm64: Test triggered (failure will be ignored), i386: Test triggered (failure will be ignored), ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for lilypond/2.24.4-6: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for minc-tools/2.3.00+dfsg-16: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for murasaki/1.68.6-17: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for node-imagemagick/0.1.3-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for octave-interval/3.2.2-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for octave-queueing/1.2.8-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for openscad/2021.01-11: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for osmocom-analog/0.0~git20250208.4ebf64f-1: amd64: No tests, superficial or marked flaky ♻ (reference ♻), arm64: No tests, superficial or marked flaky ♻ (reference ♻), s390x: Test triggered
    • ∙ ∙ Autopkgtest for php-imagick/3.8.0-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for php-zeta-base/1.9.5-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for plastex/3.1-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for publican/4.3.2-7: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for pysdl2/0.9.17+dfsg-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for pythonmagick/0.9.19-11.1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for pyx3/0.17-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for r-cran-magick/2.8.5+dfsg-1: amd64: Pass, arm64: Pass, i386: Failed (not a regression) ♻ (reference ♻), ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for r-cran-tikzdevice/0.12.6-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for raster3d/3.0-8-3: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for recoverjpeg/2.6.3-7: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for reform-tools/1.85-1: amd64: No tests, superficial or marked flaky ♻ (reference ♻), arm64: Pass, i386: No tests, superficial or marked flaky ♻ (reference ♻), ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for rubber/1.6.7-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for ruby-mini-magick/5.3.1-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for ruby-mojo-magick/0.6.8-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for ruby-rmagick/6.0.1-3: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Regression ♻ (reference ♻), ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for shutter/0.99.6-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for sphinx/8.2.3-12: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for sympy/1.14.0-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for therion/6.3.4-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for videotrans/1.6.1-9: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for wand/0.6.13-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for webcamd/0.7.6+repack0-3: amd64: No tests, superficial or marked flaky ♻ (reference ♻), arm64: No tests, superficial or marked flaky ♻ (reference ♻), i386: No tests, superficial or marked flaky ♻ (reference ♻), ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for xbrzscale/1.8-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for xplanet/1.3.1-5: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for zbar/0.23.93-9: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Missing build on riscv64
    • ∙ ∙ Autopkgtest deferred on riscv64: missing arch:riscv64 build
    • ∙ ∙ Lintian check waiting for test results on riscv64 - info
    • ∙ ∙ Too young, only 1 of 2 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/i/imagemagick.html
    • ∙ ∙ Reproduced on amd64
    • ∙ ∙ Reproduced on arm64
    • ∙ ∙ Reproduced on armhf
    • ∙ ∙ Reproduced on i386
    • ∙ ∙ Reproduced on ppc64el
    • Not considered
news
[rss feed]
  • [2026-03-11] Accepted imagemagick 8:6.9.11.60+dfsg-1.3+deb11u10 (source) into oldoldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-03-10] Accepted imagemagick 8:7.1.2.16+dfsg1-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-03-10] Accepted imagemagick 8:6.9.11.60+dfsg-1.6+deb12u7 (source) into oldstable-security (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-03-09] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u6 (source) into stable-security (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-03-09] imagemagick 8:7.1.2.15+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2026-03-07] imagemagick 8:7.1.2.15+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-06] Accepted imagemagick 8:7.1.2.15+dfsg1-2 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-03-01] Accepted imagemagick 8:7.1.2.15+dfsg1-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-01-29] Accepted imagemagick 8:6.9.11.60+dfsg-1.6+deb12u6 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-01-29] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u5 (source) into proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-01-26] Accepted imagemagick 8:6.9.11.60+dfsg-1.6+deb12u6 (source) into oldstable-security (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-01-26] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u5 (source) into stable-security (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-01-25] imagemagick 8:7.1.2.13+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-24] Accepted imagemagick 8:6.9.11.60+dfsg-1.3+deb11u9 (source) into oldoldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-01-21] Accepted imagemagick 8:7.1.2.13+dfsg1-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2026-01-16] imagemagick 8:7.1.2.12+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-03] Accepted imagemagick 8:6.9.11.60+dfsg-1.6+deb12u5 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2026-01-03] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u4 (source) into proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2025-12-31] Accepted imagemagick 8:6.9.11.60+dfsg-1.3+deb11u8 (source) into oldoldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-12-28] Accepted imagemagick 8:7.1.2.12+dfsg1-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-11-16] imagemagick 8:7.1.2.8+dfsg1-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-02] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u3 (source) into proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2025-10-28] Accepted imagemagick 8:7.1.2.8+dfsg1-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-10-19] Accepted imagemagick 8:6.9.11.60+dfsg-1.3+deb11u7 (source) into oldoldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-10-18] Accepted imagemagick 8:7.1.2.7+dfsg1-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-09-15] Accepted imagemagick 8:6.9.11.60+dfsg-1.6+deb12u4 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2025-09-12] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2025-09-11] Accepted imagemagick 8:7.1.1.43+dfsg1-1+deb13u2 (source) into stable-security (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2025-09-11] Accepted imagemagick 8:6.9.11.60+dfsg-1.6+deb12u4 (source) into oldstable-security (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2025-09-10] Accepted imagemagick 8:6.9.11.60+dfsg-1.3+deb11u6 (source) into oldoldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • 1
  • 2
bugs [bug history graph]
  • all: 127 130
  • RC: 0
  • I&N: 78 79
  • M&W: 48 50
  • F&P: 1
  • patch: 12 13
  • help: 1
  • NC: 1
links
  • homepage
  • lintian (3, 17)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 8:7.1.2.15+dfsg1-1
  • 100 bugs (1 patch)

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing