{"id":"UBUNTU-CVE-2026-30929","details":"ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.","modified":"2026-04-22T20:34:12.720913Z","published":"2026-03-10T07:44:00Z","upstream":["CVE-2026-30929"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-30929"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2026-30929"}],"affected":[{"package":{"name":"imagemagick","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/imagemagick@8:7.1.2.3+dfsg1-1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["8:7.1.1.43+dfsg1-1","8:7.1.1.43+dfsg1-1ubuntu1","8:7.1.1.43+dfsg1-1ubuntu2","8:7.1.2.3+dfsg1-1"],"ecosystem_specific":{"binaries":[{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"imagemagick"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"imagemagick-7-common"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"imagemagick-7.q16"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"imagemagick-7.q16hdri"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libimage-magick-perl"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libimage-magick-q16-perl"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libimage-magick-q16hdri-perl"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libmagick++-7-headers"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libmagick++-7.q16-5"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libmagick++-7.q16hdri-5"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libmagickcore-7-arch-config"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libmagickcore-7-headers"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libmagickcore-7.q16-10"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libmagickcore-7.q16-10-extra"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libmagickcore-7.q16hdri-10"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libmagickcore-7.q16hdri-10-extra"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libmagickwand-7-headers"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libmagickwand-7.q16-10"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"libmagickwand-7.q16hdri-10"},{"binary_version":"8:7.1.2.3+dfsg1-1","binary_name":"perlmagick"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-30929.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}