Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0473

NIXPKGS-2026-0473
published on
Permalink CVE-2026-25797
5.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    3 packages
    • tests.pkg-config.defaultPkgConfigPackages.ImageMagick
    • tests.pkg-config.defaultPkgConfigPackages.MagickWand
    • graphicsmagick-imagemagick-compat
  • @LeSuisse deleted
    3 maintainers
    • @faukah
    • @rhendric
    • @dotlambda
    maintainer.delete
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
ImageMagick vulnerable to Code injection via PostScript header in ps coders

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the ps coders, responsible for writing PostScript files, fails to sanitize the input before writing it into the PostScript header. An attacker can provide a malicous file and inject arbitrary PostScript code. When the resulting file is processed by a printer or a viewer (like Ghostscript), the injected code is interpreted and executed. The html encoder does not properly escape strings that are written to in the html document. An attacker can provide a malicious file and injection arbitrary html code. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

Affected products

ImageMagick
  • ==< 6.9.13-40
  • ==>= 7.0.0, < 7.1.2-15

Matching in nixpkgs

Ignored packages (3)

Package maintainers

Ignored maintainers (3)